0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) io_submit(0x0, 0x4, &(0x7f0000000500)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x2, 0xffffffffffffffff, &(0x7f0000000140)="3c5737611ccf4d21c3ca050b16d47b2dad78f547f1fa18fc59362c670c6049f53eebf61a0c9d13cbf00efe10a59eea7bcc1c555f4e981e36fa27c8cba1b734ec3478edbfd61541253a4531eb2270bae82a033db0c54a14e8f23f50988e049681f3d5971f63751d1173d9d3c1ee247b9a35e17d0a223fd7da51f6c461a1448041c3f4081ae4a82a8546d007117a3cefede7636712b365b8649f7a38a3d5b02aa8b3", 0xa1, 0x5, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x3ff, r1, &(0x7f0000000280)="d975013d9531923e2a15ad", 0xb, 0x7, 0x0, 0x2}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0xfffc, 0xffffffffffffffff, &(0x7f0000000340)="1291e37faf12f222d3dfcfa350434d1af7618bf1bd408fadf2e373978f", 0x1d, 0x1, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f0000000480)="f730bce8b7e2a3de6cf4629b1bb5923d893856d21ff226df5b4bd58f354685a50c73bd7f3748262d2d848ac0de7fcda903da790064b0cfa002fddcaaeb594587b53c391a9edd33b01e7a4ae91a84cb5cb1a02dbc03b1ce68ef50f2ddd971a09d403cf278c75a5c037ea1c7c851dcbb60481b5e02f4d8ad1b", 0x78, 0x3, 0x0, 0x3}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000008, 0x40010, 0xffffffffffffffff, 0x8000000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 03:23:48 executing program 4: clock_getres(0x0, 0x0) 03:23:48 executing program 0: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xe, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x115, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0xb96, 0x6}, 0x0, 0x0, 0xfffffffd, 0x2, 0x0, 0x2, 0xffff, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="836acc9659000000100000f818c700000000000013f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956f499e5370b7c045581c53ab5a8a967b80400eaf600000000000000067af5ffffffffffffff006cba00000068e7ef8d8d231419b09d65eb8f2f9462e80b6bdcbefbf715ee6ace4437d8ea567e54b14269c5a4b2634956de83", @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="7f93c584e2040000000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20000840) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 03:23:48 executing program 3: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)={0x18, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_TUPLE_MASTER={0x4}]}, 0x18}}, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) pread64(r1, &(0x7f0000000280)=""/178, 0xb2, 0x9028) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de633978e40", 0x9b, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000004c0)={'filter\x00', 0x4}, 0x68) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000340), 0xa0002, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0xa000) r4 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r4) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, r4) write$binfmt_elf64(r3, &(0x7f00000001c0)=ANY=[], 0xfdef) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x4001, 0x0) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000140)) 03:23:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000280)="880017000000000000170108273c000000000000140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000000140)=ANY=[]) link(&(0x7f0000000200)='./cgroup/cgroup.procs\x00', &(0x7f0000000240)='./file0/file0\x00') socket$inet6_udplite(0xa, 0x2, 0x88) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000002c0)=""/197, 0xc5) 03:23:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000380), &(0x7f0000000340)={'U+', 0xfe0000000004}, 0x16, 0x3) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:23:48 executing program 6: times(&(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="34000000260001010008eeffffff00000000000053c9c675c1f5c7c8af0d324342d10e92b4b599e512e1612cc435e93b0fedffd3eb09632fd50373be4dfa440d36e97a979a5f641cf0e1f959634e051aa1b59c51cf371662dab4fc769de7996fd0d853466e4e8f2894b29482d4949d9cd0f235b107e89a3993e84643fe44b5f8d536c6a63304eb838e079ad92bfc978bf3106fd5b309341a2ad122f2b00fc99ca4b3e5d8fc0046b5e59a2bb22c19e57d145a129ff47789ec67ce38fbb89c435c0ff60186b3beffe97adfaa00"/232], 0x34}, 0x1, 0x0, 0x0, 0xa0}, 0x0) syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x4000000, 0x2, 0x3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) writev(r5, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000340)=0x200, 0x4) ioctl$VT_DISALLOCATE(r3, 0x5608) socket$inet6_tcp(0xa, 0x1, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/205, 0xcd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendfile(r0, r2, &(0x7f0000000440)=0x8001, 0x8000) 03:23:48 executing program 0: faccessat2(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0xb2, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8000, 0x9) creat(&(0x7f0000000040)='./file0\x00', 0x0) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0}]) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) openat(r0, &(0x7f00000001c0)='./file1\x00', 0x141000, 0x11) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}]}) r2 = open_tree(r0, &(0x7f0000000240)='./file0\x00', 0x10100) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xff) [ 651.833377] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.6'. 03:23:49 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_to_bond\x00'}) fallocate(r1, 0x0, 0x0, 0xfdef) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 652.002510] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.6'. 03:23:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) vmsplice(r5, &(0x7f0000000240)=[{&(0x7f00000015c0)=',', 0xa302}], 0x10000000000002a3, 0x0) close(r5) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, &(0x7f0000000100)={@mcast1, 0x0, r4}) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xac, 0x13, 0x400, 0x70bd2d, 0x25dfdbff, {0x15, 0x9e, 0x5, 0x3e, {0x4e24, 0x4e24, [0x5, 0x80, 0x7, 0x1], [0xfff, 0x2, 0x3, 0x8], r4, [0x0, 0x7]}, 0x3, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xb, 0x1, "8c5d14ca7613a3"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "9cb0a60b6a57da9d360d1980b21c742168957b1b7270c743b4d264a8a369a7f31382dd0e73aade3ae87a78526b571240a835b80fe03294cc4925a521931ebbc2044c5065c5ced00fd51a9a4d6551854b"}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {0x0, 0x0, 0x0, 0x0, 0x800000000}, {0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0xd4, r7, 0x1, 0x0, 0x3, {0x8}, [@ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @ETHTOOL_A_EEE_MODES_OURS={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xab, 0x5, "313e496408fa792b0510b89bf2223acd733ba3b9accf157a65ed377a732487b59fd4f5f136bf7f0ed4a34cfbab510728dc6a4f0af573aefd2d69f192a8dd93047a528541b64c4ec77c2987298b841083cae91067fc9e2585e753b14db72ae3a755243f74596c06e8b82cc18add198d30535864cb2e1afb142a50ece208da5001ed86b4d77a08ff0d3718e2cdc23b4b7432c8e3a0bd1f51ec78f003a6e71138970d525fa4c8f575"}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0xd4}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0xe, &(0x7f0000000280)={@empty, r9}, 0x14) [ 652.444990] EXT4-fs: error -4 creating inode table initialization thread [ 652.449829] EXT4-fs (loop3): mount failed [ 652.461310] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:24:03 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, @in_args={0x2}}, './file0\x00'}) setxattr$trusted_overlay_redirect(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', 0x8, 0x2) statx(r1, &(0x7f0000001540)='./file0\x00', 0x0, 0x400, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) ioprio_set$uid(0x3, r3, 0x4004) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x4, 0x3, &(0x7f00000014c0)=[{&(0x7f0000000380)="c6f4baebbb269c3b3dc4b26fa04cf8a0993bd7b4854e20c298743626a075df3c86bfb7feb4aed6c083bb1ad87a4ae0d3c108c33c887f8db56b02d20c3f26450ae32fa979fdb8a129ba31a46bd5dcb9cac7cea58f50f9adc53961f40b40662d6509f86ecb79d4ea44ad8ba40db687d511c7201c53f3f1e5c627d06fa4593e6f88302abbac0ccce4d79456a6a9a25fdd1af70a265214b69500300e57e64fc4b1b38e6d0daab12ec135b8d4d3559fdf09c0afc3e62cab00abce48a1ef2fd1990ef1eebf8709d3b208f74f26faf1d003eb51e75d10a7a767e1e072834eeff00eeeff06ec3821ccd54714b873b4cf76198ae29d029c4044d630233f26725e871ff3fd72f0c55f6ab15f54fe6745fbf0dc810228fefba5405f6d451d2b3b6281f0c2b245a688bf08badf24aa7c37d09bbea427c841d7b4ad4b80c02f2870ae737842503b890b61948caa4a3366627fdc17cb8954081f616bd4c5fca4c7683ef6c77445c39f45bfc74aeac9d230d747996cf4eb840327f7b757705d986cc090e866c9499b7a17b6e723d52f06c5e9a15f9d0651ce6ded88cf77f6e6f6437ef3154189fdd2627634c1435bb3a8520a2250e3d87721eb61ff2681333f7bc36761b4c3601da5c46a42630f2839dfb092e81baff6d9777d54abcd474ae876df27435c149fb2101422607cd4456c53bccd6244fb0934d635abdff37e0811cbad6e681a99dccec4e0c8c77b52647c3c292a002bb973a899f8f1337607f9a59980e91162b5c575a07a248f75f925585967200f93d1a93c03843f64808b4a873a258c66d6c21659dc87282cb4cef41531dbdf85aef4fa44d27645061742db48ffd591ffdd5368917e0ef4da87081003c05637098bef670e819b53cb0ee80c823d095778bc78a87aab3c01dba68e18f419b2443bdac93a8a525eb69f3574d94031d8d128c8a4a7e98078e7ea4071a1b1179baf54cfce0c51cb78f2c62e6e0995149d5e4a897d49e16f8fb7dad310c6e1ca20d11de889d4273dc1175e3348d64f0a4e54ec278a372604322a6078b11fdf3e1d89caa33a2e97bc3666361712d4757baba21d27f5ae97a2e3e05d0eb5b4c1e59e020d4824598b92ab0d74c72620ac1e2b58fc9939aa61672101c4e57efe48cc9371ba154e07acd2b021ccf756da98dba756111e82d1b0283ba60c3ac7a002fbeef4037f60a5b35c79c86c03e4f2343ba43a66a4a2f16c3597d6afb87696d9b045d181db5f55919079b4343af54d2e2efcb9b8f94ea1acb40a5a5b85ed0cb7fe74d9f236619f70bc83f0af26264f471c8961b8b31d1976135dc04b2bdfbe0ca79458ae40942efcf29fd953bf066d457880daa51b4314d0f01137b9101838dbc6ece4f7b77d69cde597876e32436e5f4d8bb1ba84b2d36fa15477fe820877dc14f3f0b4892edc0694f1baf9d86e971622bd109f0c2c3700fa326b287a72c57dc885cdf200ff6dcf8303e206de41f42f844c00b7d1a842fe4ffcee7083f060005db11474ab8f1321dfbcccce0c30667528f3d7ceceb50118c1f5119ea03cc22d54a9099b0c27b6a7e5d31b998b42d86cb069570f9d5b2f6a94254143bf67612e5d66a46620174a8b6526ca4cb7b11c2f5a9a563437a0d5f50bb508292e604ea7954e0c4d8aa38aa431f46edbe7cf7546dd8bdab0b54cba7cf8e5b0a57e1a3c8023fb0f0facad62ebec5964d78d0728bee238933601a926ac0be77a615bd0092d9cb08965948252956b43dc46a21d9a75e41d64a17060f81409e6722dfd4a37871292c68c84be3c25cd58f4ad735b48a9b5e61cb95931185c7e7bdcfb6b791fafb1d211e06e187d0378edf999978408da1a26d0577049e1dd5f3adeb617a522bf505669e940a5d080c0675b21b9593f6a4fb29d3bffe3b617540a1d45802b0fa593b2bd7a08fc4cbd4e272c28b075b23ed8f7c63190bbbf598ac530294e3f03bd0ab3779f34f7e7c115a199096ae014805ab5623e9fcb79b2ac66ebb0cab5fae8c3cc546c823e4da8a62d81008008f8294fec5f2acf5b53b2e0d701a8a388d27035d28f5a105b0016f6c151b389704e78245e62b3b29d1a9783c2091c4e23e0d903b3b96f95563ab626bf1cb557a9fe382a566883b4362f069fc69f6233aed499e9be109a0210d0b497f99699544c925411734a7aaa9d3450838da4208d3267f03e0d945d4d882d0bfc57cf9c01d8bf98308c772c2482e86d14b0a60ab2cf60cfc6ff1e87d4d917c674e6a910f98604704a0210ee9b131472d53866dd2a3136545e3f662669dbe94a080e04f5b418423263a452c9a740fd46f0ba50a69b76f27ac3a6eac730fe8a435c6dcc0f6b426f880a0b6a484876f637be04121df9cae072316e2a0ecdb2ed596e7935f7e0312b22db9a9b232183560e9db7cb223c42364dd359876c5286033886fb708ceb7bf482da8ce12cb540c5943c3804111beb9fabdec9c482cbfc297fbe4d0ec0cd6a533b735ae8f0106b4c456b2ee94a15a550948736a3f3263eda60fb0ea18731a9f4b224c46ec6e7bd8dc99a479f14b390cdb54f2082f6280c8921aae7653127b6f04a28d2449506733538f277b92a6c0b055c48b9f20caf761853b1f1f648274c4444ec2aa08fe7cced20ade713a65a310e1603118f94acd839e2cac9e6da3873daec3a7bf8c057823867c6e5096f6fd3c7f4047484c0e224437533ea54e72ba3510da193fd5a1112dbe97d3b24e4b48e02c0df74f4aaee18f7b69f1925cb7739352f24ceaa2af184c941638bbfb523f0d7bed49915a41f6d41a536c9e07c97ee810e45998a182712df8efeb625beccef39ff35512c16239d01db36d5416ef12f6bf9614107634e45aed6e6a9fdd976c7531707c7c66a2f5d13f373ec2e69520dcfa080e661724e79f1ba38fcb6440f04192a84b41e7f21e8d4848aecfb28850208f214b2d4349442a30ce3b303b355088ff4fee141daec40295bf70e2c10d46b432fb2b03ca642df7db71a50532af7fce62e03fdc5a3a0b881851a438067f3ed851f894d8b3932e128bc706ee9730ca06319f9cfd84548848d35bf95820b472e6cf7807ca1a843ca925726daf406b68b72180cbf1ad13428d84fcf274b1d6ab8ff4cc2f0628fbe028accef05f750fcad8d946f8bf41405dbced250678073cd65223a622663bce41db4326086707bf3896945b42f61ba16b1553cfbcbc690013c78440a9f9a748d19d4bfdf48f23b39d1a29c688c50d5163b9e1c4f1ba0de0aa1ea2fb1a3eae7ee866bb0ab3e0e6bac895ba2f90852b3f851b277b6a889a2c00487f4b766e0d4bfe67d10bc8ffd161424ade7bbd8359f31bec2625af274d11ea943034ee6d252453986948ae15841b625ffcb6655a463e51d3f79c5bbd885d3ecae0af272c3ad612d821bccb95834f8c0a3d5400c44b445bc03d2a3d5a0102afdeb8beb3e64dfb97dbc7fac79bfee174d8ab4b17389501f5b1e43481c231b53fad05f42ac4f029e21498537e3cea54f78ce025d52840e67f7e55495d6df2fc4d799c710684b4c963e4394b85ad6ef47955927aee7e745e02793e81cb46d9b1f44960ad8b28a72ccf29bd3771faf7a1f03fc57b8fe4a888c84d074d9051369746e01c66b13b64159df7c02a80ed1c4cee160bfc9c7470a55302ca1798bbba65a2d97a03b83217ac5d8dfb12edb675692fa03bc46e37c0371c1c2b3e5fefdee46801e0f29c33c83e4e094a80b58ccea9972c04bca155102af582df981b94aab4f85c580b1c7c8f2dcd6d877767c00e789ed1632be11f2e49535b20c07c8e2dd3600b2b7871541d9f6e9c8e786a789f518b9f2e96d2c185120e2d9b48dd98994595b7d3d65ee1acc2f9d1339949c471a173929d45d0850efba20a663c9b74ac193d5985750e98bb7f090b455c37f4aecd028f09396e8ad94d1247303293a651e1eb38cdaa44f902b10737fb9c210bb2326925ca2caf384be9aa5426bfac23d1a321e50bf471a8e098b1750c079d0551017010271526028bb1d28b2cc6929829e29f01bc2e62c832b2809638d28e906ae2fc3724cd09d3e382b1b14db7cf46c69920a3e0d5ce0580a1d4681a1fcd83936c0e81c869b799852be83fde3c4ac36d78c83a172eeb5fd3f891b08d8389024f634aa27be89047bc1448f4e8e20ff1fc1eb10e1cd989fe5b2cb12456f9c04def702e4e86d8fbcb47297b94c23d9fa78a79e5cbd40cf407f5e8ba6776396e51b3fb95926e3920951ffe96f16d9f46c211a06c6441b4620b5b11d3c3b731d22eb428136aad964959dd173f363582a648f74eabbb3dbd2fbc867128ea3207ce9297d6ba9673e4d2da0af872fb6c8d5e62c0f1ef7f29f4f19f623e0e32b794ec8688d930120ae11cc29f601706ce69659001ae7b1c912d99dacbffa60bc6a274018c9338318caa9cd726452bbf17f42958526f3c6cd4bfe5a0f0b2ac7ee8bfb2c6e8b6c8e62f70ca768e58eedba5ba60f41ada5c2af889a51bbf2323b85a5f2957004b9ec426a3935c05270b5bc8263f4367e24cc4b6342aa7e409924407c6a8755b1bbefcd27b115a357738dc62b6e9af3247720f31231cc4099532b62577ba6e512195ea8885620432eb6b8a0f91ce0916ac57ed9d8ab5bfc2ed6c1e78c55f554aa081df8032c38054be7cf49433b0000224333ed32eea56e94bb3cdae9ffb359a82edca52108ea4de84aeb4330f9067e83d8e9e6cc2c67f9d04d9a684a641c01444847cb4fa7a008b0438647f5309989fb622c5970979d831a86b5c52f65e046d142d7445ffb87327ee36e63e6a58c5f377cc05dbc1a3af982d7d274b490fdb8acb85069973f8319a9b06c32e94e3947a1a9bd4eaa119bb1f4fcdfad342bfc1f59afa83301e8c20dd81ae407efce74339af5d4ae2896bc61e85bd342e46b6aa3664296181b0080e3aa5cae00bc70d6f0e8bcfafc2a080a1fc09ef52fc204a7d0b40d94a78f8bca1efe1d500f2604b17d7195bbd1963d5360cc49bf90d98941d7c515ec3d63dc261c41bd2450088c75b63fbbeaeb91a212ead05e2d3fe5481af702062ca17defa318064e075fb4e4785bf805eb1d75628749d88ec14ed916144637dcfecc79d57d67e24063745db78537080a8d63116f5d5225ec7ffa65171cdc0b310d06bd05356ef70eea0eef94f554308df6b3165bc3ee440c868edfd0ce0acae0e3feaaeabae980b18e9a4a9bbc0cd7a3aaefb9b135a6f98ddce681b1b6c7daa3c96b5f773b91b26468c5438e2c17070a78bb0c9e95810738d74f2e30e73e671d0d9f58f60821b4a44d52847af091962d10e217760f8c0e724a39fce9df615d761ff109d271f0aead5850d6d246557676bc1c41e046bc5039a3f502bb75b5365dd8250accfea5d0820641f4cec0bffb9260507f0d5b67b566fda0ba90e226722f88129da745695e5e2558ad7f3c3f6e22fa3ed3492f3d6b31b05fda5aca8a7557ad737396a5b6ff902fba6ab9a87f0bb6b6d677d4d2ab3da428f0ca520b2f40250390904a75a939f536c23665173e1f3f1f40f46374ca2933e9d40ea3ee9e820c3217bb01a8ab382f4fb788e54e51e2b3c6b02b12e38b361b19d9fe679c00551f6ef99759b9e5e980d4d1161a3bb22a07fc3a03fcfb55186829982b23d5fd59df4ed8b793d11365769cbef5bb8f1eba287acab992ef8bf9861802e382339c49e796a8219a8fb93d7ba434883630810b1bc4c903a48365ec8d5b8d7cd3f29f051eaabd0504ee1fd7354192c477ee0faa0b0c01bcc72de701a4c5ebad5f71260292aa7c5100f106c36466ba119181cae36c2cb31aa7c60507538de75d", 0x1000, 0x4}, {&(0x7f0000001380)="ca9d682e5abb41d6638bd73b20302844b1c6f671ffbf210944ab916e94f8f319b39df1136961f5307c3f094bea2a119533a334450766341b0b505d19444ce19c30977b7a1830929eb886ffe6a36e2aa779434a813afa7d28ce9d2c852de1803f86a879c6cc9a8f7690839fa50ae3838069f5abded2687a39e832f647e4380dba40396af2630277192c", 0x89, 0x4}, {&(0x7f0000001440)="337a82151feb047b8ec3c55afe9e2725b4747c6f3c8720639d9f8f0a40f4d64f5956418846196126e53ffd0b25d48624403e3636c955539f1ca8eaf9a97ddab65c9b86f658af8570c3abb5562cb7aa64f7c5e8e28b4ef74a659ef008531274c2f2608cff78", 0x65, 0x9}], 0x2802800, &(0x7f0000001680)={[{@data_ordered}, {@test_dummy_encryption}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe558}}, {@data_ordered}, {@errors_remount}, {@resuid={'resuid', 0x3d, r2}}, {@usrquota}], [{@fowner_gt={'fowner>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) sendmsg$nl_generic(r4, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="700100002b00000426bd7000fbdbdf250a0000000a007b002f282d712400000004008400040058008600218008002e00", @ANYRES32, @ANYBLOB="5681d31227ac9839a5fb3abcae4e73e7f332f9869128cb9d5366ea85bb454de6805d812f03969102b2d00bf37cf1ee4325adb6a9a6aec99058c63f238bd73806ea55a347a8e2ed77af115076b9a50c4de853349003e8e4c29a751d2e478bbb18fcaf96d2ea6ea4b5949bfdf86f67c7039e580800470002000000000018003f80140079002001000000000000000000000000000008004e00", @ANYRES32, @ANYBLOB="1832bb43c8e2463dc2cc236b29021fae274c6b9e291fb86b6b0e6f2fa51da822fbcb699313c66d5df3f17ccf047d460b938e5f238014e414a75b3664278d1168f0f9ebdd5dcb858f9523c47498df7f9001496b439cc6be2dc550d42cdd8b72494a14540afb46d62ebea7d1b133c9b6f5fab44b22c243e243c62a3a0e8e4c18e9048dcc3153b49c85006d169d4746458281cc67c5e8f49d512694cfb8c6000000"], 0x170}, 0x1, 0x0, 0x0, 0x8001}, 0x20000080) 03:24:03 executing program 3: preadv2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x62) r2 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(r2, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x20) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffffff, 0x0, 0x1a340, 0x100) renameat2(r3, &(0x7f0000000080)='./file1\x00', r0, &(0x7f00000000c0)='./file1\x00', 0x9) r4 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r2, 0x80089419, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000140)) r5 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x4840, 0x2d) sendfile(r1, r5, 0x0, 0x100000001) 03:24:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000380), &(0x7f0000000340)={'U+', 0xfe0000000004}, 0x16, 0x3) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:03 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000000c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "822b3b5b3ced97"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000010c0)={r0, 0x0, "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", "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"}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x82800) 03:24:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=@acquire={0x250, 0x17, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}}, @in=@local, {@in=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}, 0x0, 0x4}, [@algo_auth_trunc={0x126, 0x14, {{'sha384-ce\x00'}, 0x6d0, 0x180, "faa42a328de8bc9f415f5e16d11e92054ce16a6aea030a5ddc73b7519f28785bfb163b28a4880b6ed653a013d829055ed5c5bfab26806ad11722e12faee442b267607600e0ef56b3ec0f5c7c813be3f21674c2e5dcf80108a83e9d32df18d9e05f1eea953a85eb125ce27f42abae17b7ff7e75e7191e33f6a94ea7e4768c7312888a70db952b934349856e2571d3e458dcefe9eee31ae1d2a4e27f3850469b214ea46cebb32c19f3b794434e65dc8ed77f2521b8d3a2c01a6d1ed554a8497396ebd7dbac9d296536fbf65bf0533df3fc4b52e722c0d91c6e693f"}}]}, 0x250}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x98a) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x238040, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000), 0x4) sendmsg$nl_generic(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="0400c087e9efa6c5db74a4d7231b57b900"/32], 0x14}, 0x1, 0x0, 0x0, 0x4000825}, 0x0) unshare(0x48020200) 03:24:03 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$mouse(&(0x7f0000000000), 0x8000, 0x4400) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x1) setsockopt$packet_int(r1, 0x107, 0x10, &(0x7f00000000c0)=0xfffffff9, 0x4) getsockname$packet(r0, 0x0, 0xffffffffffffffff) r2 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x8000000) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r2, 0x8000000) syz_io_uring_submit(r5, r4, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x80000001) r6 = pidfd_getfd(r1, r1, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r4, &(0x7f0000000100)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x10020, 0x0, {0x3, r7}}, 0x0) sendmmsg$inet6(r1, &(0x7f0000005440)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x9, @private2, 0xff}, 0x1c, &(0x7f0000003400)=[{&(0x7f0000000180)="0df7cbb5d707d1a53de4cc55f866951cdd6123fab82cb209d8fd6f7048c43edf94c31082b1c9bdf93c24bbdb569356049a608b6b0722d5dcf90e57656e704cdb197d6824c2d6f3f9e4d1bc561ef355a40573a757914b76079db94dc68f82fb879305e318aa680cd70e9fdf3213950f6f35847c615cfb8f3036e955c87dbd48ca403fb254bd24e5ed8349d2ce26dff1c1c9ae1f397fb427ca3851c229511125154fde3be02a8dc07e4c533dca2b5b474eb52ea5c14c7cc14870d7df43cf91e54500ddcb93ad99e2e48a4d77", 0xcb}, {&(0x7f0000000280)="221152ba83eec4789bdb4e15d0bebaa411730e80c9439345f4c972771f0a24ffba7d07aa048026939b204a93e095d9da0f8c16c475e25013c9d5d359e64a82aacc4b78654dc6618ad58bc4332b55", 0x4e}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000002300)="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", 0x1000}, {&(0x7f0000003300)="18c7ec4f8e6b02254ffda358f7367b9d8c1f855e8d5e1828c128253cde88ae53a15c263e7c6c18c11a6f5995dc4f674026b3a8afa9a14959cce42541e20e64f05de53a1bdd2301a248e45f1022631c85dd03239002e50d9ca69f62782d54f4c27ab954858ae4a9dacd717e709a9e25c8562a6f26b0f3c91698523113402133ac851cb6548213435b5033a8a6acda5f7f22f79b37b399988faca74d58822328466688bd6d19d6f77274234d7960d629d081f98c7ca905a60714b9a75aaa4145e23137b58c29e9e2f344d0faf455a42ead720b743a85f2178c91498cfdede999940f291824cff4fd995a41ea8c05b06a6fdb8a21ec9a117a", 0xf7}], 0x6, &(0x7f0000003480)=[@rthdr={{0x78, 0x29, 0x39, {0x42, 0xc, 0x0, 0x90, 0x0, [@mcast1, @mcast2, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0xf7, 0x0}, @remote]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @hopopts={{0x88, 0x29, 0x36, {0x16, 0xd, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @generic={0x1, 0x4b, "a19627314cf98f15333d6c002772ce87a940b0d7a60ffdbfcca45613a63df58383eb44f7361b2c9d6f32e8879d8473de7094ea9dbb3d2a97e04b3c2f1949b1a1fafd513a625ee9ecb65838"}, @hao={0xc9, 0x10, @empty}, @jumbo={0xc2, 0x4, 0x1}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x148}}, {{&(0x7f0000003600)={0xa, 0x4e23, 0x8, @mcast1, 0xedb3}, 0x1c, &(0x7f0000003a80)=[{&(0x7f0000003640)="d498a610c9e444023ffa6bdc566cf20e9fd51552e9923cad8a27511b24f4e014fe8b5168d94e6904d29723067074f548bccb75c3df08f6884c3d57e4a8f85bd87ea28fe66f852f100769792c78d8dd78c1ad4c638f93878d3f1ce1b1c3fe1d", 0x5f}, {&(0x7f00000036c0)="6c87eebde11328034384562d518f2fea528bdf9597cd99f8ecab0f5464c3dd7dad5ba579d2b8982e25c20d10c7e16715986dd6a5f9ea43d90d984d81499de70d6ab909", 0x43}, {&(0x7f0000003740)="2d140759d899ce343a9d5453a9b4026434fff0040511a675c279be9928ae502c228711de44699f626b79eeb02d8dff83cd7f1efff38247bdf90e1a74bd5458f99546f275dd7c21d936b6090c5ae3801576465009d49ecfabeb033222bc7caf947404d981ff551d977315b9d9bd4f01fa56c20dae37a79f9bb54cb075d20c89d8e53dc1eaabd09b2e6c80ae79ae3fd62672ec6e1b78e49842c21da19f9361028205f643fdebbdb1033228e3d4c8a0bde49d30535b1fbca9d76c16517b10019ffbc7c50ef83e5547a972ae2d051bfde6fa38f7f7411eb16f3c1b349bbcfabb20b8ba3309672d8c989f8408b9a304b4f4ae0be583ecea32c82e", 0xf8}, {&(0x7f0000003840)="a88ff9b8de9c8cf7fe56b978cd75873a22eb4cb730b474b5a267d506495d0c8adb3e67146f4dc94a8da6dc58c65c7a631bf0561895983f66038b45ca7005b4587ce22a814a2463a6504bed115cf1377b1b9c2f22dfa3d5f6c91bec7ae1a6db0c1cb398d80498628a473ff0cb6c1b1eebb9c040f08e0409ee773c3c7fb578be52e8f30600a2f55413471195918c510d", 0x8f}, {&(0x7f0000005500)="a810cce44d7e976c228e24e2851817406f309392d2e73f79a56001d6c010c824b9af5568bcde00c9521d869bd938acb90ca3fddf080ca9c712cb48ad81693b0d4daf292319e032ec1f6a4534c31606548502b9915cfe67b514fa2c0891f87ac5f0436cf61218b25f8864164113ee292934c5fb178511fcc4c8ab89dbb0641f3c1786f8fa7d3ebafc732d3910e20e28dfcc60df34f8f90cd0b8653533b0976a71d534ad683a7459e20b9f36430ad60995c20eb1c3be017314532632859d212f22db15c42331fcf4d195", 0xc9}, {&(0x7f0000003a00)="5bf085a9e3284ff4ab2ecf63e921b47ffb2eb6d0b6fc0d0489669058e5658de6d9b71367116c121615e832e1dc9feb2f676f7f76f28acd21145307ca58538b9a6c82427a22a2a513d7c25b148dfcc4daeb9273fbc184a7d9e2dbbcde48514c0409e3cd45d44d2459423e", 0x6a}], 0x6, &(0x7f0000003b00)=ANY=[@ANYBLOB="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"], 0x258}}, {{&(0x7f0000003d80)={0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @empty}, 0x7}, 0x1c, &(0x7f00000052c0)=[{&(0x7f0000003dc0)="4252928e844ba7fa180ce7efcdde538a6a783169c352f02ec69fded242c1b7052cc0bc60e02cbd363481d51f9fb29a31019aecf6f1aad904c76942ee9ece9dd9fc08e1c9a771f582", 0x48}, {&(0x7f0000003e40)="9c4521032ab47a477867167a9b58bac1cbcabe6eb39886c97f11a2dbff212c6e8e6b115dfee286fe76e1a4418ffeab56861cee52f53fb9", 0x37}, {&(0x7f0000003e80)="22491e3a6ef853376027b72993af771e442090c0401d347b236ecd5ccb68a3e622", 0x21}, {&(0x7f0000003ec0)="ef054cab8f45b0d0e8646c1a6b2a3ee9", 0x10}, {&(0x7f0000003f00)="34a0c48a675c9d26576d4de03d8474b5a743ee24faf5b261bf11fd9511b7e1d0101fe4f0be29e5b1f37fd8fcdd53680789650e555edcfe8fbda40de671e27a6ab2ccbaf3236ecb16740fd6745e448b0a", 0x50}, {&(0x7f0000003f80)="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", 0x1000}, {&(0x7f0000004f80)="ef00c4021a10ef4e8a4035bee907c3e5e9954547bee5f041cdd6cb9b0670c20b5e87de18dfdabdfbbc964d2fbd1cf44b9629d0f6e3fc574e3ec0041f235c3e61c52dda2ef9811410840219b1e9e27ef4bcd897f7204e5f144fe3c6afe86a173391176c690d8ee8986d12c5114bba694aa670fe2b61b2883d1776afd3aacb7af3b085f06d0ff5c6ddc052297c966c5758d6202370eca3cb0a8fb04417ec2632536c302a66841c47a8321b7a5a60b73fd86b473a7ceb2052dbb2eb852386349bb143eb4d243a911cf8f68f774b1099a550b7123ceb8460bd77687ed589e56326d4", 0xe0}, {&(0x7f0000005080)="8e1deef9ee0682c113e4c1c26aa849353fada79a3ef81f81ca513f8f0ff3166bb788a401ed5dd4a284f3dfa246fa6996542cae46bcb997ec8351f4d77a8900bcaffd6d903076439d5075ada5a3e9b8b3da5e1ddddf7063fd3db02436ff3cf0e71e3face22a2df16f5d67df989c6a7835b0bc", 0x72}, {&(0x7f0000005100)="a518d8995d961956878d21e0c83f0d10f2f26595c87f8a3e630de9298230855b1dc9325a0ba057040142753391327e36a225f865b44e591d15a09c52e7502cf75a0246ad24c312dc6b1524e9280a45a882ce048e0d5243b5d56cc5a4131653a87ca14f730a8080cd06f18ef87cdc0eb1945af6202a7a578540cd66f435c9ef10d4caed0b8b4925dd185abb710d642a3725e4807a218082c42fb0e32737", 0x9d}, {&(0x7f00000051c0)="cb8d8c42cf16d0f863548e5461fdf8addf60c9afa015e20442ad0281d4317041c64a774c92685c659f25d8aa6daaebbb474cd3d7a853db7497035f71b5c8a16096607c5f96934b4d725c72113eaf6d6e5dae2355e17ee713f5253efe114a1ab0787a68afe180c0879c2f7a4fc1ace3cadddbd6c2a0207b03ebcdd5e0c6b880dae6be8e6b058a8be8c64126c8033f2b42f16bf9f076ffebed2ed138592fe880bcf7a6451cc2f3af1e4aefce96d4fc60b1f973b43090a2b7ceb4030d4538871f958c497decf92486d5cc", 0xc9}], 0xa, &(0x7f0000005380)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x33f8}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x32, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x80000000}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @pktinfo={{0x24, 0x29, 0x32, {@remote}}}], 0x90}}], 0x3, 0x2000010) 03:24:03 executing program 1: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/16]) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)={0x288, 0x2a, 0x1f, 0x70bd28, 0x25dfdbff, {0xe}, [@nested={0x132, 0x8c, 0x0, 0x1, [@generic="c00dd8fabbb367c85c436c454f2cf79f9e3188af217c21d28d74fc293860f1924bba126253b13e41bf993ea728ee0da0f0b99d0f54d3db4112538984d474d175166897afa3a1012471d9f6baf445a4701deb632b9225acbe50e1148d0e3076b9f99f7873063bdad520b391c6912268cd67198cf6b30d4398f9563ae14811a3d877b8f23877525a09859eaa1cff6a9adc205c40ddf53a0157098fe4a0b477187e81e30158054070edf2c3324cf56a532d1fc71cf75f42718fc47ab59b6d9a461264c1bb37cf0723ae9725b37b7af3f4dca6eba1e5af1d7043d19dd927ed0a14442adf7a1bb014e740bdf4bd352a00ddba45399a3a72b7f5ad3dbfca8f05838f617ac5dd465926c2dd9e5159d04d90b1b6778bd5d0ee73396fb3ae", @typed={0x14, 0x63, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}]}, @nested={0x140, 0x6e, 0x0, 0x1, [@generic="cce5a7efbd431e5da05a8f200bbac86c48e7ad279bd1fbdc9d71e1d9d46140377c0d4541a3c3efd68414b4880afe1f64de82345d8a33e03299c6eea215300082885f4569129f2963d3492549d34b249e5e857fce2d0f85cd12e0d7", @typed={0x8, 0x4e, 0x0, 0x0, @fd=r2}, @generic="10a25a356c8177953765b55582de403ef8264af6e540172acea6310fbc574ce24851ec1898c1cba165432070a61feb6ad2ede32e780ac1d6295d4a8d0825957fc606a53e5b8e809594473ec64fbc3706b972353a557f1807a8d57b55e56cd78b75d45205e73bb53103d55a4a9502be494fa2189642ce1376e36b0d72e51b4b1ac77b36bb394a284e360fe09149eeeddeb501f65318a7802664d353ea31bb3583f1b6c199fda833f3dc8935810692d53e87b2890bdeff884e528c272e25798948d0f7f4ab7d9c64fd0fbdfa422e239927f10fc3f3a2b4f08d28"]}]}, 0x288}, 0x1, 0x0, 0x0, 0x20040800}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat2(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x444002, 0x2}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000280), 0x561001, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) fsmount(r1, 0x1, 0x71) r6 = fsmount(r4, 0x1, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000052c00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000052e00)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053000)={0x376, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {r7, r12}], 0x6, "5c83c9bf8af498"}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001c00)) mount$cgroup(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x2812020, &(0x7f0000000400)=ANY=[@ANYBLOB="6e616d653d2f6465762f736e617073686f74002c6370757365745f76325f6d6f64652c616c6c2c6e6f6e652c6370967365745f76325f6d6f64652c78617474722c6e6f7072656669782c636c6f6e655f6368696c6472656e2c68756765746c622c66736e616d653d2f6465762f7a65726f002c736d61636b6673666c6f6f723d2e282b2d5e2c6f626a5f726f6c653d5e282c00"]) ioctl$FIOCLEX(r5, 0x5451) syz_open_dev$mouse(&(0x7f00000004c0), 0x1, 0x432000) 03:24:03 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r1 = creat(&(0x7f0000000200)='./file1\x00', 0x2) chroot(&(0x7f0000000280)='./file2\x00') r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) signalfd(r1, &(0x7f0000000000)={[0x401]}, 0x8) chmod(&(0x7f0000000440)='./file2\x00', 0x4) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000400)=0x0) r4 = openat(r0, &(0x7f00000003c0)='./file2\x00', 0x143002, 0x43) syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x9, 0x0, &(0x7f00000003c0), 0x10024, &(0x7f0000000500)={[{@map_normal}], [{@dont_hash}, {@measure}, {@subj_type={'subj_type', 0x3d, '`\x00,'}}, {@smackfsroot={'smackfsroot', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@context={'context', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) dup2(r4, r1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) [ 665.990898] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:24:03 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x87) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x2, 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000000)={'macvlan0', 0x32, 0x37}, 0xb) lseek(r3, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r3, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 03:24:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000300)={0x0, 0xfdfdffff, 0x1, 0x0, '\x00', [{0x6, 0x0, 0x0, 0x9}, {0x800, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0, 0x3}], ['\x00']}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'macsec0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="3c0000000100000003000000030000000220000001000100060000000700000001000080"]}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x4, 0x9, 0x4, 0x4, 0x40, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @loopback}, 0x10, 0x80, 0xdcc8, 0x5}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x10, 0xf29c087660c2f880, 0x9f13, 0x2, {{0xb, 0x4, 0x0, 0x15, 0x2c, 0x68, 0x0, 0xf8, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, {[@timestamp={0x44, 0xc, 0x93, 0x0, 0xd, [0x3f, 0x5]}, @timestamp={0x44, 0x8, 0x59, 0x0, 0x8, [0x1]}, @noop]}}}}}) accept4$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14, 0x180000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003280)={'veth0_to_bridge\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000003580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000003540)={&(0x7f0000003400)={0x130, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48080}, 0x4000) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x109603, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r7, 0xc0389424, &(0x7f00000002c0)={0x5a, 0x8, '\x00', 0x1, &(0x7f0000000240)=[0x0]}) dup(0xffffffffffffffff) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) unshare(0x48020200) 03:24:03 executing program 0: ftruncate(0xffffffffffffffff, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000680)=@v1={0x1000000, [{0x5}]}, 0xc, 0x1) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e73355f642c7004006e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',dfltgid=', @ANYRESHEX=r1, @ANYBLOB=',posixacl,loose,version=9p2000.u,dfltgid=', @ANYRESHEX=r2, @ANYBLOB=',version=9p2000,fowner=', @ANYRESDEC=r3, @ANYBLOB=',dont_hash,defcontext=unconfined_u,measure,smackfshat=\',\'A,seclabel,pcr=00000000000000000051,defcontext=user_u,appraise,\x00']) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0xc, &(0x7f0000000100)=0x3f, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000700), &(0x7f0000000740), 0x2, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 03:24:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000380), &(0x7f0000000340)={'U+', 0xfe0000000004}, 0x16, 0x3) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000240), &(0x7f00000005c0), 0x400) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r3) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rc={0x1f, @none}, 0x80, 0x0}, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x107142, 0x0) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0xa0) signalfd(r1, 0x0, 0x0) io_uring_setup(0x25ce, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r5, r3, 0x0, 0x7ffffff9) fallocate(r2, 0x0, 0x0, 0x8004) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x31300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 666.078546] cgroup: Invalid name [ 666.135145] cgroup: Invalid name [ 666.305139] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 679.248331] Bluetooth: hci7: command 0x0406 tx timeout 03:24:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x14}}, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000200)={0x0, "0070404651fd796ab47483a4c1be26133a48d389342f53cbb88cc2f96518c9ca6fb689bb56a2824f0f6fc853011e3c529931bbfdcfad732e9f6c146e67b6220c"}, 0x48, r2) keyctl$chown(0x4, r3, 0x0, 0x0) ppoll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x82}, {r0, 0x8109}, {0xffffffffffffffff, 0x4}, {r0, 0x90}], 0x4, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) 03:24:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2046034, &(0x7f0000000040)=ANY=[@ANYBLOB="00fdf302c5260686a4b8ce7c571d6f3887021cce0dfa5a68892197de5a68fba7fb588cef080f6d7fa419ae959745499d36a6dd782f38"]) 03:24:18 executing program 4: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8140, 0x108) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) socket$inet(0x2, 0x0, 0xff) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x48500, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0xfffffffd}) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000005, 0x40004, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x100000000000001, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r3, 0x0, r2) readv(r3, &(0x7f0000000240)=[{&(0x7f0000000180)=""/185, 0xb9}], 0x1) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x20040000) getgroups(0x6, &(0x7f0000000080)=[0xee01, 0xee00, 0x0, 0xee00, 0xee00, 0xee00]) fchown(0xffffffffffffffff, 0x0, r4) 03:24:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ftruncate(0xffffffffffffffff, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2c, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x2c}}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f00000002c0)={0x0, 0x4000000, 0x2, 0x3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000002a40)) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r4 = dup2(0xffffffffffffffff, r3) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000400000000003dda8d5c787e6876a95223d985f0e382e72428100d6d5997ad50b6087bc9137ea00ac7d99c0157005b43e30a7a8be8b4d8adc234b69d6acfd40773fd5387d42dab52b4a9aa629e9f9b4ffbfa6a345950d6db1d98077d515d01c6d66c4166695cceb0a41465afea19055d2fecef4223ae1a11670452c2d252598c826c78cfd710276a35c15553fb77b57627399bd8c23f4a7ee7e6d721b01b18d8d036629c96a7d110b3858021acf34077ff181bbacc2f3897594cb3e097ba28ac991562ffdcd5942faf85940bd9754bf19c03e937bd646c2cbc23cb4622496b58c9354d29fd4ac61ea180"], 0x20000148) socket$netlink(0x10, 0x3, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) openat(r4, &(0x7f0000000040)='./file1\x00', 0x40000, 0x5d) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="240000001800210c0000000000000000020000000800000400000000080007ed361f96db31d80b3fbe00d1ac301ed5ada3e76db130b2bc789862249cc796a59741b287006e0310", @ANYRES32=0xee01, @ANYBLOB], 0x24}}, 0x0) 03:24:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x24}}, 0x0) openat(0xffffffffffffffff, 0x0, 0x428082, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0xf8d3ae32b73bdc9) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup(r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="a172674c0000d4e55ab508d84ffbf5719aed9e5ba3fe5ae5eedf8034eb945f3d17dda95c3ec23cef174d2635e55feb43c2071117bf95d8f3c3ba0c53d24e9a818ecebc2411b3942f42d7725d50b07b77692e11bfad2a22d77d01d005c1477fb32da0a407e36ac285336eb04046dd0f18237fc126e11369bbd46322b64ad9aa69d55df30e193554eeba7b4b8335c14491982412adde9b1614700c5107e40adb5ba46e59a0ce2162d766c0da7e28fbe3b2425125c097c2b7d161ba3442231082c2d859d270f17731b1ce586295dd78a75d79bf3c347fb82405aa871651c66119d35c9b17414970cbacf510fd5afdab3e0b8fa0f95e45703ab10ddeb26175c06e21cd39c23e8078000000"], 0x24}}, 0x0) recvmmsg(r2, &(0x7f0000002e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file1\x00', 0x131) 03:24:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000380), &(0x7f0000000340)={'U+', 0xfe0000000004}, 0x16, 0x3) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0xffffffff, 0x3ada03) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000040)=0x3) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, r1) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000080)={0x0, 0x0, 0x4}) 03:24:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x709802, 0x0) ioctl$DVD_READ_STRUCT(r0, 0x5330, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x30000, 0x0) [ 681.364155] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 681.371053] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:24:18 executing program 5: mknodat$loop(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000001d00210c2dbd300000000000000002000800000008000000"], 0x1c}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000001640)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x20002, 0x0) readv(r2, &(0x7f00000015c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/186, 0xba}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f00000002c0)=""/186, 0xba}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f00000014c0)=""/193, 0xc1}, {&(0x7f0000000440)=""/45, 0x2d}], 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65}, 0x8) sendmmsg$inet6(r1, &(0x7f0000004d00), 0x400000000000070, 0x0) [ 681.422975] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:24:18 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, "77004a6efdff0000000008002600"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$inet(0x2, 0xa, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 03:24:18 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x2f, 0x8, 0xd4, 0x20000001, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, 0x8000, 0x40, 0x80, 0x7d}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000180)={'ip6_vti0\x00', r3, 0x2f, 0x5, 0x6, 0x7, 0x14, @local, @remote, 0x40, 0x700, 0x10001, 0x8001}}) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) dup2(r1, 0xffffffffffffffff) [ 681.476476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:24:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001e00000400000000000000000002000008000000", @ANYRES32=0x0, @ANYBLOB="24fe36d64306e52bba1a6c039e20d113d3b297d08c67a8a1d89955f8810ea4a89fc285cc4cd549a2a9f9f35bd0515ecba2dc28875f4a76d6b42d33ce"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 03:24:19 executing program 4: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) r3 = syz_io_uring_setup(0x620e, &(0x7f0000000580)={0x0, 0x0, 0x10, 0x800000, 0x4000000, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x8000000) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r7 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r7, r5, &(0x7f00000002c0)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x5, 0x80000001}, 0x80000001) syz_io_uring_setup(0x7b09, &(0x7f0000000440)={0x0, 0x97ed, 0x4, 0x3, 0x2e1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000100)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000240)=@IORING_OP_NOP={0x0, 0x1}, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000540)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, 0x1, 0x0, 0x1}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x77359400}, 0x1, 0x0, 0x1}, 0x20bc) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_ASYNC_CANCEL, 0x1) r9 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r9, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x6, 0xffff, 0x80000001}) r10 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x0, @fixed}, &(0x7f0000000380)=0xe, 0x80000) syz_io_uring_submit(r6, r8, &(0x7f00000003c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd, 0x0, 0x0, 0x6, 0x1, 0x1, {0x0, 0x0, r10}}, 0x9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x810, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x7, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x76d3, 0xf6d2, 0x0, 0x0, 0x0) 03:24:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x30, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0x2, 0x1}}) dup2(r1, 0xffffffffffffffff) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x0) execveat(r3, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000004c0)=[&(0x7f00000003c0)='\n]#!:+/(.^\x00', &(0x7f0000000400)='%&)\x00', &(0x7f0000000440)='-!*-\'\x00', &(0x7f0000000480)=',+-\x00'], &(0x7f00000005c0)=[&(0x7f0000000500)='/dev/snd/timer\x00', &(0x7f0000000540)='-:\x00', &(0x7f0000000580)='/dev/snd/timer\x00'], 0x1000) r4 = epoll_create(0x8000) epoll_wait(r4, &(0x7f0000000080)=[{}], 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x0, @fd=r4, 0x9, &(0x7f0000000140)=""/26, 0x1a, 0x4, 0x1}, 0x1) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r3}, 0x8) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f0000000680)=ANY=[@ANYBLOB="9c45cb289520a04477258c59b47e45f5af7c6cc58be2912302a30a941821400c6235af0d7d64133ef17d282b6c60cfc0d7e9809d843becbf9f45447d1d03292cc66d4f40da3d4f18f164c340d9f2e3cb1be7a1e79c63edf5295e9b9f5cf71c3556d8d1d0e0bde6f33ed0e759b269705d1d60e77474c68805ca9675f46ecb4ac49f4f25ff22d3d70e44dda2c3b1e4174ae124b65c9404918e15065591b541ae477b3d69b3e2c5f7dd7905fae3e0232f3769b9573fe73664a410fa65dbb46ea35fb4b9a6858e8a7b2336f776a1ce62ffc6de1637ab26cecc3c749f9a792ed2fafc4952f9049bcdb1ea8072a83cdef5466f121840325f9a0b452ae9bd838f1d809523160000000000000000"]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'rose0\x00'}) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0x11}) [ 681.759516] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 03:24:19 executing program 0: set_mempolicy(0x0, &(0x7f00000000c0)=0x6c0e, 0x7fff) syz_80211_join_ibss(&(0x7f0000000040)='wlan1\x00', 0x0, 0x0, 0x1) syz_80211_inject_frame(&(0x7f00000000c0), &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x2f) r0 = fork() fork() tkill(0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x2, &(0x7f0000000100)=0x3, 0x4) kcmp(0x0, r0, 0x4, 0xffffffffffffffff, r1) r2 = fork() syz_80211_inject_frame(&(0x7f00000002c0)=@device_b, &(0x7f0000000380)=ANY=[@ANYBLOB="0e21000000f6ffffb5a18d7e0000000000bbd4c2fd00696e"], 0xa) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x8, r2) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000400)) wait4(0x0, &(0x7f0000000080), 0x8, 0x0) wait4(0x0, 0x0, 0x20000000, &(0x7f0000000540)) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000240)=ANY=[@ANYBLOB="c0800600ffffffff7b000a00c701800000000000003ee80000d63c56703167b0f9100000000000000000000000000000eaa4b30d27753e2de6e869cc1c8bbc204d84f328f022ab9e4d25d57d882ee9345ae1b8cfa26b012ac3feef4d9117cde051aa120b32da509ad7344f17"], 0x30) wait4(0x0, &(0x7f0000000180), 0x20000000, &(0x7f0000000480)) set_mempolicy(0x0, &(0x7f0000000140)=0xffffffff80000000, 0x6) [ 682.210362] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 [ 682.309719] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 682.316325] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 682.628253] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 03:24:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="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"]) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000001840)) r2 = socket$inet(0xa, 0x3, 0xff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x8) r3 = dup(r2) setsockopt$inet6_int(r3, 0x29, 0x16, &(0x7f0000000180), 0x4) r4 = dup(0xffffffffffffffff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000000180), 0x4) open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) openat(r4, &(0x7f00000000c0)='./file1\x00', 0x842, 0x2e) syz_io_uring_complete(0x0) r5 = dup(r1) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000000180), 0x4) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f00000001c0)={{}, 0x0, 0x0, @unused=[0x5, 0x9], @subvolid}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000001e00)={{}, 0x0, 0x2, @inherit={0x48, &(0x7f0000001280)={0x0, 0x0, 0x5, 0x9, {0x27, 0x9, 0x6, 0x1e4, 0x5}}}, @subvolid}) 03:24:46 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x2, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) timerfd_create(0x0, 0x0) r1 = syz_io_uring_setup(0x5, 0x0, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000540)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x5c33, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1cf}) r4 = socket$inet(0x2, 0xa, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="46ce2a72", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf2586000000050018011e0000000800a100220b00000800a100050000000800a1000000000008009f00040000000800220172030000"], 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x1) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x40010, r5, 0x10000000) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) io_cancel(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x7ff, r4, &(0x7f0000000140)="786d49385046e60a89f4ef27c13fe91ed5c2a0ad4799839ad76eac97ebca3c2a947adbdd6265238f7904b85cc08c3ce69b7f88cc027a180673b5a11d4907280a124cffdb6163348c7045dcd02d6f210fe993", 0x52, 0x2, 0x0, 0x1}, &(0x7f0000000280)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) 03:24:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RELDISP(r0, 0x5605) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="01fa736a750000002e2f66696c653000"]) ioctl$KDSETLED(r1, 0x4b32, 0x400) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r2) r4 = syz_io_uring_setup(0x132, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r7 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r7, 0x0, 0x0}, 0x0) r8 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r9}}, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000940)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x1, {0x1, r9}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000002, 0x10010, r4, 0x0) r10 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000d, 0x2010, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x7422, &(0x7f0000000980)={0x0, 0x90ec, 0x20, 0x0, 0xfff, 0x0, r4}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000005c0), &(0x7f00000008c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000a00)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, {0x0, r9}}, 0x85a) r12 = socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r0, 0x1, {0x0, r2}, 0x6a0, 0x1, 0x0, {0x0, r9, r12}}, 0x4) 03:24:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)={0x30, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x7ff, 0x13}}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300d1166205bfd4b79768a571f0c1b91574788df037c64fee6f962fb902a7f79aabbe159e5707253fdac1413e8354975bcc72d8d7e6eb926863cebf296bf7093ed261d80f24e1814206736ad0102384655369ae551d434afca230961a24b8f95e64a1b7ee6221bb668ac3f1ab90359555eb0ed5fbb8eb37a0b64f32c6f9feba41779503aad7fb3fe1df41f5f630d41bda5408b54ada9a597a8c6f1fbd09f6fb", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a00060008021100000000000800350000000000080026006c090000"], 0x44}}, 0x0) syz_80211_inject_frame(&(0x7f00000002c0)=@device_b, &(0x7f0000000300)=@mgmt_frame=@probe_response={@wo_ht={{}, {}, @device_b, @device_a, @from_mac}, 0x1ff, @default, 0x1, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x8, [{0x2, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x16, 0x1}, {0xc}, {0x12}, {0x18}, {0x24}]}, @void, @void, @void, @void, @void, @void}, 0x36) nanosleep(&(0x7f0000000340)={0x0, 0x2faf080}, &(0x7f0000000380)) syz_80211_inject_frame(&(0x7f00000003c0)=@device_b, &(0x7f0000000400)=@mgmt_frame=@auth={@wo_ht={{}, {}, @device_b, @device_a, @from_mac, {0x0, 0x1}}, 0x0, 0x2, 0x0, @void}, 0x1e) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000280)={'wlan1\x00'}) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[], 0x54}}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) 03:24:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x6, 0xffff, 0x80000001}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffc53, 0x0, @perf_bp={0x0, 0x2}, 0x10046, 0x0, 0x2, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000740)=[{&(0x7f0000000680)="2000000080000000060000006a0000000f34dc0a4130f5f74111f73ee16bd9000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100401f753523ffff53ef010001000000dff4655f00002399be8bf25e08992a0dcfa8376ef200000000000001000000000000000b000000000112f218637660031115cd98f4638b715dd27155cf317554c7c770c7b6ccc689c4b121f12ae7747ecf0e7de68dade0d9a409fea2a68c", 0xb1, 0x400}, {0x0, 0x0, 0xfff}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed410000000800001c00000000000000e0f4655f000000000000040004", 0x1d, 0x2100}, {&(0x7f0000000040)="79ddbb67450e13", 0x7, 0x80000001}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7573726a71756f7461c164652c9d912df329b5c3d9000000000000"]) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x40034, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="4eb3144f1031a52aa7f6406d1440f0b475ffde29c24db06e997cf8f4fa1f00", @ANYRESHEX=r2, @ANYRESOCT=r1, @ANYRESDEC=0x0, @ANYBLOB=',fsmagic=0x000000007fffffff,defcontext=unconfined_u,\x00']) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="e52ef1a3fa36e399239b154a2561cbb2", 0x10) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/anycast6\x00') getsockopt$inet6_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000540)=""/241, &(0x7f0000000640)=0xf1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000004c0)='highspeed\x00', 0xa) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) syz_open_procfs(r4, &(0x7f0000000240)='autogroup\x00') pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x1000003, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x2000, 0x7, &(0x7f0000ffd000/0x2000)=nil) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280), 0x0, 0x0, 0x3) 03:24:46 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0x0, 0x5}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r2 = mq_open(&(0x7f0000005c00)='-@\x00', 0x42, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x10041, 0x14) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000180)) lseek(r1, 0x0, 0x2) timerfd_create(0x0, 0x80800) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r1, 0x0, 0x200f5ef, 0x0) 03:24:46 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001e00)=[{{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}], 0x1, 0x0) [ 709.143739] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 709.162240] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 03:24:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xc008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mount(&(0x7f0000000280)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='overlay\x00', 0xa02800, &(0x7f0000000580)='!(\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r3, &(0x7f0000000240)='./file1\x00', 0x82000, 0x134) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x8, 0x0, 0x8a, 0xff, 0x4b85bf51}) openat$vcsu(0xffffffffffffff9c, &(0x7f00000003c0), 0x200480, 0x0) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="2000000000000000000000750000000006000000a6ea5311869479fd220c28f45564cd17f447d3c376150a61f12c8c0b9840544468de5bf36ce057d85c1d8b92eac22fa97879311de4c87c08856c4f207cd3d69f044b2ab80fddda2e05540c681abb965ee98cedb98325190b892b501156e437"], 0x20}, 0x1, 0x0, 0x0, 0x20044081}, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/virtio_pci', 0x80, 0x0) ioctl$FIBMAP(r5, 0x1, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000005c0)=ANY=[@ANYBLOB="6250e8ff997d1c6818000000ff11855e861dcf85870b6642717f6066149654e367a4168feffa0c2f95121d82b84005b5eebebd446e17fd0ebb89f77a68ddb73ece427ee4aa9dc7fcccc101321b7b1e449e6850878d39138f519f604ad9aba6ac80d34a485238aa19da21049590a4eda0fe02841991c4b12091985340ab672dcb0eb46236b7151fd0bdae934ff402c0d3f6c1ea1bfdcda1c66461c62d8c21f7908e021171ea607d0ec0d2c5b940124bf64931f26e18a527c40c4950aa96831a42d31bce654eb49e1176f21e5ccdf525ff2fa96992287f4e16234dec8852637380fe2bad25a0c5fe00000000000000000000000000fa609d7e742bf33cfc921ca895d2dabedb81b013d9e684c754874abc0cca1bff", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) sendfile(r3, r2, 0x0, 0x7ffffff9) [ 709.224763] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 709.237134] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 709.296759] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 03:24:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:24:46 executing program 6: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000002c0), 0x4a, 0x61bf, 0x2) fallocate(r0, 0x0, 0x0, 0x8800000) socketpair(0x3ebf78ed8ccfe3cc, 0x800, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x40, 0x1) dup2(0xffffffffffffffff, r1) socket$inet(0x2, 0x5, 0x5) dup2(r0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='.*}\x00', 0x5) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0200e000000000002e2f3000a517cd58c7d95c355ee700000f00"]) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) linkat(r3, &(0x7f00000000c0)='./file0\x00', r3, 0x0, 0x0) [ 709.455832] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 709.594614] device veth0_vlan entered promiscuous mode 03:24:47 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffe9a, &(0x7f0000000040)={&(0x7f00000000c0)={0x34, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x34}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000440)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000500)=""/116, 0x74}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYBLOB="250300000000000000000100000008000100000000000c0099000000000000000000"], 0x28}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000000f06050000000080000000000000000406000b000000000005000100070000000500010007000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), 0xffffffffffffffff) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r4) sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x4c, r3, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x41}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) [ 710.042748] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 710.098108] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 710.148760] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 03:24:47 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x6, 0xffff, 0x80000001}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000240)=0x8) r4 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8e, 0xc0, 0x1, 0x7f, 0x0, 0x7fb, 0x0, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp, 0x4, 0x6, 0x40, 0x2, 0x2, 0x5, 0x7fff, 0x0, 0x200, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r3, 0xb) r5 = fcntl$dupfd(r4, 0x406, r2) connect$inet(r5, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) ftruncate(0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x20044000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xb4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r7, r6) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0xcd, 0x2, 0x81, 0x0, 0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x7, 0xfff}, 0x4080, 0x9, 0xcd3, 0x2, 0x100000000, 0xe1e1, 0xa3fc, 0x0, 0xf3, 0x0, 0x4}, 0x0, 0x4, r7, 0x9) add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@chain) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 710.160191] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 03:24:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000140)=']\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)='security.capability\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x36, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9941, 0x62077fda}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x40, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000005c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x100000000000ffc) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 03:24:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) socket$inet(0x2, 0x2, 0x4) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r3, 0x0, r2) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) r4 = clone3(&(0x7f00000004c0)={0x800, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0), {0x19}, &(0x7f0000000300)=""/104, 0x68, &(0x7f0000000380)=""/216, &(0x7f0000000480)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5, {r0}}, 0x58) kcmp(0x0, r4, 0x6, 0xffffffffffffffff, r0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000011300)) 03:24:47 executing program 5: ftruncate(0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x20044000) r0 = add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000200)=@secondary) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@chain) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "dd722e32162db827ed6f3fc6d73425297a20a08a5c4477d6d731308a201d0763b5b267b8db2e5d811fb29b034305d3d47654dbd72b641f61dd467ec58b3cfd33"}, 0x48, 0xffffffffffffffff) keyctl$update(0x2, r4, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r0, r4, 0x1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r2, 0x52, 0x64}, &(0x7f0000000780)=ANY=[@ANYBLOB="656e633d6f616570206861736b6532732d3132382d7838360000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000b226efbe72c6e684c10000e5aca1101bcc753ae462ede3fe90ffdf30344bba1195061a0689f5bd94862302f69edb6885c77f026874b47106da5e4f2bbd588b9527722aeb507202231f86fa1653fa7ca9f9ea5a99853ccb2600bdb5f3a0ff010c72128ebdd76b2ffd842f86013c3d576fc893944ee3445fb30f2ae5f754216fae808e0a0ed627cbd3fd808e450a954e6d2a0a31fab856f9b2d1b0a12be8bfb6b0a07a29e74ae7beebe8fcd87fc7297c7cdb40606b226daef39c9611186b5eb1ac231486075e204c5d03fadb157dc668db9d2b5913659ccab5356cdbb9a6635e92d7f8fc706babc000d26807a27d68e4b7cdd18d8fb501608a18a759882d5295be85a5a06833aaefe7cf160ff4068f1b5cbb6b1b36a713ff1ced5a"], &(0x7f0000000280)="5d73449c19fe117891c00e6e17777f21b1fb2057ad2f2c82d2af8583ffdf549d1af9d1b0f60bd44bdd68596eaa5e7bbfe5371e88b50503c5d7950fe172aa94b9fafb9a2549e98f4378dc651ea93b64a13741", &(0x7f0000000580)=""/100) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)=@chain) 03:24:47 executing program 6: r0 = syz_io_uring_setup(0x24, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x6, 0x0, @fd=r0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_LINK_TIMEOUT, 0x1) syz_io_uring_setup(0x4, &(0x7f0000000080)={0x0, 0xec9d, 0x0, 0xfffffffe, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000240), &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x2) io_uring_enter(r0, 0x7502, 0x0, 0x0, 0x0, 0x0) 03:24:48 executing program 3: r0 = inotify_init() r1 = dup2(0xffffffffffffffff, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r3 = clone3(&(0x7f0000001280)={0x100008000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), {0x1a}, &(0x7f0000000200)=""/4096, 0x1000, &(0x7f0000001200)=""/42, &(0x7f0000001240)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5, {r2}}, 0x58) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f00000000c0)={r4, 0x6, 0xffff, 0x80000001}) r6 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r6, 0x0, r5) kcmp(0xffffffffffffffff, r3, 0x3, r1, r6) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef01000100000600000000000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xffffffffffffff7f}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}], 0x10005, &(0x7f0000012b00)=ANY=[]) [ 711.167022] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 711.338748] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 716.046869] Bluetooth: hci2: command 0x0409 tx timeout [ 718.094746] Bluetooth: hci2: command 0x041b tx timeout [ 720.142732] Bluetooth: hci2: command 0x040f tx timeout [ 721.158596] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 721.160491] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 721.163320] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 721.213084] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 721.214751] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 721.217639] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 722.190766] Bluetooth: hci2: command 0x0419 tx timeout 03:25:13 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') readv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000300)=""/107, 0x6b}, {&(0x7f0000000380)=""/75, 0x4b}], 0x2) r2 = openat2(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x4680, 0x0, 0x9}, 0x18) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e21, 0xfffffffd, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'macsec0\x00'}) dup3(r1, r0, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f00000011c0)=""/119, 0x77}], 0x1, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x22902, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180)={{r4, r5+60000000}, {0x77359400}}, &(0x7f00000001c0)) copy_file_range(r3, 0x0, r3, 0x0, 0x6, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x0, 0x5a, 0x5, 0x80}, {0x800, 0x7, 0x81, 0x8}, {0x4, 0x4, 0x80, 0xaca}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r6, &(0x7f0000000100)={0x1}) 03:25:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsu(0x0, 0x200, 0x40001) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f00000011c0)=ANY=[@ANYRESHEX=0xee01, @ANYBLOB="000000002753cfd2ed7b10b4cade49980cb058100000000000000000000000000000a1a411564e9a97d30a09a1cdee05a51e7ff9883ea16d9d80c7fbfa75d8cfabbfe5651cdca145a07ef4e9c060000039658a70fdaac3136eeaf9f183fec483ef8f9b14bd521369bf2dd0651691b78d982cc5a7b8653577e15fe130407bdf3df588"]) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000001840)) r1 = socket$inet(0xa, 0x3, 0xff) r2 = dup(r1) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000000180), 0x4) r3 = dup(r2) setsockopt$inet6_int(r3, 0x29, 0x16, &(0x7f0000000180), 0x4) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000200)={0x0, 0x0, 0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x842, 0x2e) syz_io_uring_complete(0x0) r5 = dup(r0) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, r2, 0x80000) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f00000001c0)={{}, 0x0, 0x0, @unused=[0x5, 0x9], @subvolid}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:25:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000040), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000001340)=ANY=[@ANYBLOB, @ANYRES32]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697000060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dec201000800070086000000080009007c000000080004000900000006000f0002000078e00006000b000a00"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000900)={0x94, r3, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, '\x00', 0x2f}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcd}]}, 0x94}, 0x1, 0x0, 0x0, 0x800}, 0x4000) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f0000000680)={0x74, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x20}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7f}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1464}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x39}], @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x4008010}, 0x800) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) unshare(0x48020200) 03:25:13 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001900)=[{0x0, 0x0, 0x7fff}]) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) pidfd_send_signal(r2, 0x0, &(0x7f0000000040)={0xb, 0x5, 0x2000000}, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) flock(0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000140)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000740)='/sys/class/drm', 0x970c7917c8cb9e10, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x2}, 0x20) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x3, &(0x7f0000000280), 0x59, 0x0, 0x0, {0x3}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0}, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000004, 0x4000010, r2, 0x8000000) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300), 0x0) r4 = syz_open_dev$rtc(&(0x7f00000000c0), 0x100000001, 0x40) copy_file_range(r4, 0x0, r0, &(0x7f0000000180)=0x18, 0x5, 0x0) 03:25:13 executing program 5: getcwd(&(0x7f0000000040)=""/14, 0xe) getcwd(&(0x7f0000000080)=""/180, 0xb4) getcwd(&(0x7f0000000200)=""/250, 0xfa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000140)=""/122, 0x7a) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000000)=""/37, 0x25) getcwd(&(0x7f0000000300)=""/161, 0xa1) 03:25:13 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0x7e74, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="010001006fac1ef9d502045f865e31768253b8a5c5924f75a91719373a90805207e6c7d5266f29c313cb0ae57791eb712606ad906289ee61d11f83c58eef77c8ba5a7c5a22599ab3191f19aa8ac46fe282160fb4a274fb7fda55334a6d6af3417ef150b1e5f9e5849bd50ee538e06864f0e495278727180c9c18fe68857bfa6ad42b2551fc3b1bb1678c4c", @ANYRES16=r2, @ANYBLOB="010000000000000000002100000009001f0070687931000000000500200000000000"], 0x28}}, 0x0) 03:25:13 executing program 0: close(0xffffffffffffffff) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0xca, 0x97, 0x5, 0x0, 0x0, 0x2, 0x0, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48a4962f, 0x2, @perf_bp={&(0x7f0000000280), 0xe}, 0x5582c, 0x3, 0x1, 0x4, 0x7, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x44001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x1, 0x8}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r2) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24048055) 03:25:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:13 executing program 5: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={0x0, 0x5e, 0x85}, 0x0, &(0x7f0000001180)="c2ae3e8e49aaface594681b981d1e52e41b4d835305552574fa90b56b3dd154410ac602e7040ece81381dcc97afed88d919a78f98e3cfad492dcec514fb0d831a8b90cfdb7f5ae984fd819bc1b9aee4b33e09fb7f5c8da844efc4fb16e9a", &(0x7f0000001200)=""/133) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x1433, &(0x7f0000001680)={0x0, 0x2000000, 0x0, 0xffffffff, 0x8100}, &(0x7f0000feb000/0xb000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000001300)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/4109, 0x100d}], 0x2) fork() getpgrp(0x0) [ 736.531114] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:25:31 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x12, 0x0, 0x8f6, 0x0, 0x15b}) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, 0x0) r1 = dup2(0xffffffffffffffff, r0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='[^.,+\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) flock(r2, 0x7) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in6=@private0, {0x0, 0x0, 0x40}, {0x80000001}, {}, 0x0, 0x0, 0xa, 0x4}}, 0xf0}}, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), r2) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0xd8, r3, 0x115, 0x70bd28, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x44000}, 0x20000080) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 03:25:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) unlinkat(r2, &(0x7f0000000240)='./file0/../file0\x00', 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x0, 0xffffffe0}}) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000001c0)={0x749f42d7cdb64f6a, 0x80, 0xb3, 0xd, 0x5, 0x7, 0x0, 0x4, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7fff}, 0x11012, 0x0, 0x715, 0x2, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) dup2(r5, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000000008fd8", @ANYRES32=r0, @ANYBLOB="870c0000000000002e2f66696c653000"]) ioctl$SNDRV_TIMER_IOCTL_INFO(r6, 0x80e85411, &(0x7f0000000380)=""/220) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f0000000480)=ANY=[@ANYBLOB="11df4d6c850877fab8ca06e8cf91162c8a3f06987ac0e961c6ff38e6cbb2db4d4f7892c411877fde07ba2059f7f34e25990e8b4eaf0c8c9d0be8b1bbe08f2b9b51a53487147e9137f2fff28be7350bc9729e84a6d973d2406680ea1895b8d3bf5518d0a3391ab2a47e141572be30c5ebff0365a987548081b0b1aef193f7eef3a52f5c62"]) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) 03:25:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3400000010000100060c000000000000000000000500000000000000150000809be149f8326500000ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9064d68a1d688cb564c5100107341e4376c6b7894c391015718c602f3aca345aa217ff3feb018af4571f385cfa97aa0b4888bc38b88bda6372e3668ad38b7f74f5579af15595ac38e5e42f1edd80c30cb611c48d698f5ab174fbc688112a84bc0f1ed5b30c723ba82fe7b97990c195cdd6e5a3e00020000000000002633b26db43c04d57f634751"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000cc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000700)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x1, 0xfb, 0x4, 0x7f, 0x0, 0xfffffffffffff001, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x1e, 0x83e}, 0x4008, 0x3, 0x3, 0x2, 0x10, 0x1f, 0x2e, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) 03:25:31 executing program 0: r0 = dup(0xffffffffffffffff) ftruncate(r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000080)=""/18, 0x12}], 0x1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x1f, 0x7) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000080)={0x6, 'gre0\x00', {0xf6}, 0x7}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) lseek(r1, 0x3ad3, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x0, 0x263, 0x0, 0x2}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000740)=""/138, 0x8a) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000100)=0xfffffff8, 0x19) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) renameat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00') ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f0000000400)={0xb}) preadv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000200)=""/60, 0x3c}, {&(0x7f0000000280)=""/109, 0xa}], 0x2, 0x8, 0x3) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 03:25:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:31 executing program 6: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r3, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0, 0x2001}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x4, 0x1010, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f0000000480)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x5, &(0x7f0000000440)={0x77359400}, 0x1, 0x1}, 0x8001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) io_uring_enter(r0, 0x35bd, 0x4d27, 0x2, &(0x7f00000004c0)={[0x5]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r5, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x100) r6 = dup2(r3, r3) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @ipv4=@dev}]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r6, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="03000000653000"/16]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote}, 0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r6, &(0x7f0000000980)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000940)={&(0x7f0000000640)={0x2f8, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x60}, 0x4) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000140)) 03:25:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffd) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="a1dc9c1a6f18eefbe8d8d6728363c9dff2d05d1dd9561aac9f2477e657ce4b0404a05a523a52130b32920a05e6bea68827b7713043b86c616f3ad05111ff4d5d5ba20a08272d3f", 0x47}], 0x1, 0x0) lseek(r0, 0x8, 0x1) [ 754.204113] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 754.266015] EXT4-fs (sda): re-mounted. Opts: (null) [ 754.308390] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 754.372529] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:25:31 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x6, 0xffff, 0x80000001}) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r3 = fcntl$dupfd(r2, 0x0, r1) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000240)=0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)={0x54, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_SETUP={0x2c, 0x70, [@NL80211_MESH_SETUP_USERSPACE_AUTH={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_SYNC={0x5}, @NL80211_MESH_SETUP_USERSPACE_MPM={0x4}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x2}, @NL80211_MESH_SETUP_ENABLE_VENDOR_PATH_SEL={0x5}, @NL80211_MESH_SETUP_ENABLE_VENDOR_METRIC={0x5}]}]}, 0x54}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x10c, r5, 0x100, 0x70bd28, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xdc, 0x2a, [@mic={0x8c, 0x18, {0x6f6, "a90178ba1820", @long="77defc534a51f74011c9aae46b3b8020"}}, @random_vendor={0xdd, 0xbc, "5dee7efc0298d7aa426246fbe262ddb47c778b5543069eaf09ea064b30aa2dee5148447a4d59201132f757b0bc5af36865634d6fc5eca6c7b561d883e143f840cedb5386f64bf3e06111b4ad554c910b735f142aa4d50ab35949abc6c8130687dd8073a244172d1480df2dc7309da943816ddda31134111dee4fa9bf3b7e634257c9c9c582d951d7f4dff655072d2f384eebc90de52e3dcb729dfdfb9c567fc0ff9a68bee10592f5bb988fa5518c541fe291731c5e5d0f0fae8fe182"}]}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0xff63}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x6}]}, 0x10c}, 0x1, 0x0, 0x0, 0x84}, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:25:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r1, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:31 executing program 4: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x46e2, 0x0) signalfd4(r0, &(0x7f00000002c0)={[0x3]}, 0x8, 0x800) io_setup(0xc4, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r2) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) syz_open_dev$sg(&(0x7f0000000380), 0x22, 0x2003) openat(r4, &(0x7f0000000180)='./file0\x00', 0x10600, 0x53) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000) perf_event_open(&(0x7f0000001d80)={0x1, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6007811c9f860900a4737d0bc9a18bafbee4aa649aec7864c3190d8788acb017ad"]) 03:25:31 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xb1, 0x1f, 0x9, 0x0, 0x2, 0x3, 0x0, 0x3a2, 0x40, 0x286, 0xe0d, 0x7f, 0x38, 0x2, 0x1, 0x5, 0x8000}, [{0x6, 0x1, 0x2, 0x3, 0x81, 0x11d0eb26, 0x0, 0x80000001}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x1478) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ecbfd09a", @ANYRES16=r1, @ANYBLOB="000865bd7000fedbdf2520000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000880}, 0x4008000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVEL={0x5, 0x2a, 0x4}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x872}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20045010}, 0x4008000) sendmsg$nl_generic(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xe4, 0x2e, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@generic="5d19af02d85c74149132d958a4694738b1a3a80c68855a94b23e66e1681b051b36a4962c40c16185e2edc99133d1671874107e05a67a6d67c7a6431bd75f5d2f85f57cdcfeb89a310b39fd2b8123f9d3b18ca4f3cc9b98379700c44886f3106aa76e68f9438b864731b814c97f2c800242bcb667c86dd9b131b03f3a9725f823664a9604cb3da051ad60f7dc4c7ce4dd08102a711a3cb4bd1f413025f07fa1939ebd57b2d1429acd7be28a03d7f8b25d745e26854b8703cbee117f3a3dc9e26c1c84521c1f82e80e566e7068f2"]}, 0xe4}, 0x1, 0x0, 0x0, 0x810}, 0x40000) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=ANY=[@ANYBLOB="24000000ea00210c000000000000000004000200100009800b0000007d5c3a5c245b0000"], 0x24}}, 0x0) 03:25:31 executing program 0: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_START_REQ(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, r1, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x6}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa1}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x12}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0x6c}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa3}, @IEEE802154_ATTR_SF_ORD={0x5, 0x18, 0x6}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x1}, @IEEE802154_ATTR_SF_ORD={0x5, 0x18, 0x40}]}, 0x64}}, 0x20004010) [ 754.942440] mac80211_hwsim hwsim22 wlan1: refused to change device tx_queue_len [ 754.946671] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 755.041401] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 755.060612] FAT-fs (loop4): Unrecognized mount option "`Ÿ† " or missing value 03:25:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a3136efd6eca826e30d4ecab4853920930b34524ed7a91510ba4bd72eb189d5d8ab918658e9b4fb83222d814e350d3a4d263ad9fa1c322f0497eae5a95ff2056949db66da3acf83072c"], 0x76) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x911802, 0x140) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = io_uring_setup(0x5960, &(0x7f0000000380)={0x0, 0x8dc0, 0x2, 0x1, 0x76, 0x0, r1}) sendfile(0xffffffffffffffff, r3, &(0x7f00000002c0)=0x6, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x40900, 0xa0) r5 = openat(r4, &(0x7f0000000340)='./file0/file1\x00', 0x1800, 0x80) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfb, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r2, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r7, 0x0, r2, 0x0, 0x200f5ef, 0x0) fcntl$dupfd(r5, 0x0, r6) ioctl$FS_IOC_ENABLE_VERITY(r6, 0x40806685, &(0x7f0000001480)={0x1, 0x6, 0x1000, 0x49, &(0x7f0000000200)="7ed89f9c8e6234c361d3040257fdfe8923dcc09a3f4e3e6f8b952273d048bbdfe0913efbb8c715e0a68fa74e63a37049f7dfaa1dc5a3427b5c36c5415cfd5afa3b7c26be9351c9d15e", 0x1000, 0x0, &(0x7f0000000480)="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"}) 03:25:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './mnt\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000dbb108a51542cfdc63c103e9d6fa3b23325bb72c12fb57bc2b53ea7a36f3ab7f2a0feb397b591b858d320e029a40409dec22825f3e0b0a4bed82ca92ce902e9e4bb397db70bd7f8eb545503f0b89084b60424f9f472291838780bbf64e5666ea8035159cd6751d83b8580f8d05a44229fd6d7b308f195d86703fa28d49fa8a27feeddc2b271f47025c8e5a147ae344cb6ca990403d67aa524c8364c1c7e6f4eb2c3590466ec1fdf9a541c337cade130689f289", @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./mnt\x00']) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/70, 0x46, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6d706fff7f0000000000003e687508000005ca32f8eed8354ca16f6eec006a3513d660d7740616d7ae9acb2c0e1be1b4451862039751fb0950200627d8c17d0891e91cff78efc260bea4ea342aba50994e04dd366de77877e87fe3f906"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x9, 0x1f, 0x0, 0x7, 0x0, 0x8000, 0x40, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000140), 0xd}, 0x230, 0x0, 0x8, 0x4, 0x200, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x5e}, 0x0, 0xd, 0xffffffffffffffff, 0x8) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="6289"], 0x1020) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r4, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@keyring) fcntl$getown(r0, 0x9) 03:25:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 755.246050] mac80211_hwsim hwsim22 wlan1: refused to change device tx_queue_len [ 755.257022] EXT4-fs: error -4 creating inode table initialization thread [ 755.289476] EXT4-fs (loop5): mount failed [ 755.389412] FAT-fs (loop4): Unrecognized mount option "`Ÿ† " or missing value 03:25:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000000c0)={r3, 0x6, 0xffff, 0x80000001}) r5 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = signalfd(r1, &(0x7f0000000180)={[0x5]}, 0x8) splice(r7, &(0x7f0000000200)=0x2, r3, &(0x7f00000003c0)=0x10000, 0x8005, 0x6) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000240)=0x8) r8 = syz_mount_image$nfs4(&(0x7f0000001d40), &(0x7f0000001e00)='./file0\x00', 0x1, 0x5, &(0x7f00000021c0)=[{&(0x7f0000001e40)="d57284d05634604e69382cdfd55bb3a30412941d848503ef9fe21f94e9f32fd3908247d82c2da14d396199017eca54969ff6a7a9afd16fdb109be26f2b293d326b1c1b796e10c73168a4e2ca023e1c58827a2ca1e7e3f07646c2e8f3810714265898fe3132581c033d1871472327da0c03ed7aa16aaf9bb7f5b847b319be6942011cf61a2e348900123b4cb7f6936fdc18ca176e429daccbc1d53560349c13273f7d9497e5583a7199a47adc06fc4be2a815", 0xb2, 0xf4a8adf}, {&(0x7f0000001f00)="fa560aafe27d3b6f1e3f2f1fb136d7be03787389d649e77edc59d6cf208d04cc31c659a2ba1f977b5d5331ae4097667fe3072aabce005c92a126e55d506261965214b3da14be7f27339613d29f24274cdba6213b6930b2fe0b7d2cddc7783940063933be77887a24765612aec1d398f66456118dd3eba33de7934b598554944e6e0717d51ca0d65750e65a63fb4bbee7fe03c8566bd1f886b9a8e69910364db95cb27e975bc1cf77552cb4197ca93c23e28d2b27cbebc887ccfc05da24d293866f06e87adbcfcb4d4bad94dd213b5d6702dcf542e3dc24151ff4828ef1385ec00b17649e08537512e723cec872ac96", 0xef, 0x4}, {&(0x7f0000002000)="e3d2e142c0af1e6d23dc05175d54e3c680", 0x11, 0xb1}, {&(0x7f0000002040)="86d14309378fb047c17ae4abb2596ed599f5aa23b59f4abfc97c3a8a030ec5f62639bdb75e02fb67ef9fc590acacb34a07e5b08125dadec4b7cbeba187af86fd4b8529686fc54a9da2fcdaac0385053cb12475278797dbfd04eb47098e4f205e9f5fca5ebcbd72664bfaa5b85a89d07beceac1a22e9c490d3340457b1c0c", 0x7e, 0x100}, {&(0x7f00000020c0)="b3b6c473180aeedcef48b0d93bdb3b272de708111ec6ef0ca86cffb6902b7946557a44cb963910922f53b51dad6fa318f5291a35667325515dda06a6de22847e9cbd27bd30bf906686a53448115d5d4b34dc505d2771bb3a9ddd649adecba93b58035d6991b0662e9ece4eb23f4d48433befe480d92065904bb7121b4ace84303047a7560ac925b562e7c9d2600051bee5d1c18c1ff869500145760e753a24e2e76c953e10c06343610a4e793b4cf6e854a16138690a88b2af95ea8dc6a83afacdf22d2e87f7129f805456350be6ab3569ddd11b8be2db4409b524ae4c716e15b756daba", 0xe4, 0x6}], 0x804, &(0x7f0000002240)={[{'trans=fd,'}, {'rfdno'}, {'rfdno'}, {'9p\x00'}, {}, {'trans=fd,'}], [{@appraise}, {@smackfsdef={'smackfsdef', 0x3d, '!\xa9'}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="00120000ac31ec87ee691488582e2f666d5b32cafd"]) r10 = dup2(r4, r5) io_submit(0x0, 0x2, &(0x7f0000002480)=[&(0x7f0000002340)={0x0, 0x0, 0x0, 0x1, 0x0, r8, &(0x7f0000002280)="ca96133c313bb89669ec426b8d3933ab13e5d896003013e2a0be2e19a59ebcab8cf38c6ad106f7866443f19912e100887474bbba0774bf64f2dbc27ff8dcce83188ab97b7d78658a6e8b", 0x4a, 0x6, 0x0, 0x1, r9}, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x5, 0x5424, r1, &(0x7f0000002380)="3d2466ddda53507e58572a5b19a91416c9af36ca0b3a5db0bd571d6cbab19d8f4c2fc9ca96611056d62e65b8c7f33f718c28e7eb2d44aea0239b902551985f6c9b97f3f6e3c27dcee550b0ddfe604764ecbb2ede339165bd765c88438ce1b1608779bb286f800d5492030b10983397bb6a814fe6b71fba2445637bee519ebd19f9818bdf1524769999426eeddc0c9073d9468b3e1ef21d7328b75ed072acff7beb8b0ceab650454e163a4df3e14707718de31f1440ce", 0xb6, 0x2, 0x0, 0x2, r10}]) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)=0x1) renameat2(r2, &(0x7f0000000080)='./file0\x00', r6, &(0x7f00000000c0)='./file0\x00', 0x3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trfdno=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000280)="d6", 0x1}], 0x1) 03:25:32 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000008700)='./file0\x00', 0x0, 0x1, &(0x7f00000087c0)=[{&(0x7f0000008740), 0x0, 0x4}], 0x2800000, &(0x7f0000008800)={[{@iocharset={'iocharset', 0x3d, 'maccyrillic'}}], [{@seclabel}, {@fowner_gt}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit}, {@uid_lt}, {@obj_user={'obj_user', 0x3d, '&+.)^:,a([&}:{--)+#[6('}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x5b5500, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x49c301, 0x110) [ 755.500528] tmpfs: Unknown parameter 'mpoÿ' 03:25:32 executing program 6: r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r3, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0, 0x2001}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x4, 0x1010, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f0000000480)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x5, &(0x7f0000000440)={0x77359400}, 0x1, 0x1}, 0x8001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) io_uring_enter(r0, 0x35bd, 0x4d27, 0x2, &(0x7f00000004c0)={[0x5]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './file0\x00'}) openat(r5, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x100) r6 = dup2(r3, r3) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @ipv4=@dev}]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r6, 0xc0189373, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYBLOB="03000000653000"/16]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote}, 0xc) sendmsg$ETHTOOL_MSG_TSINFO_GET(r6, &(0x7f0000000980)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000940)={&(0x7f0000000640)={0x2f8, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x60}, 0x4) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000140)) 03:25:32 executing program 4: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fe26f08c717172e91d11fcf1d03e37d0a9cdc5246497e6e9be2a52b04fa488404cabd15439f170e429dd5057d7d5db566fc9e481b1128bce328ef44be2ac02ea82a613a077c2508b07638c2da855795a8523c7986a4979fc9300627bae481812a27b8f03511a4dfbfc96803b89f8efb3de820ef8e9bd306955000037976789cf995521a65b9192b2dde0498242f3042690688050b620e188a301b717bf204eb12a7fcd85332358a4e595f838fbe8e29ca7b0315e9f9e74ba8f08031384702d819754"], &(0x7f0000000340)=""/106, 0x6a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe66f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x2030}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xb9d5, 0x4, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) syz_io_uring_setup(0x2117, &(0x7f00000002c0)={0x0, 0x0, 0x20, 0x0, 0x80000}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) recvmmsg(r0, 0x0, 0x0, 0x16060, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={0x1c, 0x1, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000000000), 0x5ac, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x81, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_setup(0x4a9a, &(0x7f0000000240)={0x0, 0x6f39, 0x4, 0x1, 0x3b3}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f00000003c0)) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000140)={0x401}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) [ 755.950990] tmpfs: Unknown parameter 'mpoÿ' 03:25:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './mnt\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000dbb108a51542cfdc63c103e9d6fa3b23325bb72c12fb57bc2b53ea7a36f3ab7f2a0feb397b591b858d320e029a40409dec22825f3e0b0a4bed82ca92ce902e9e4bb397db70bd7f8eb545503f0b89084b60424f9f472291838780bbf64e5666ea8035159cd6751d83b8580f8d05a44229fd6d7b308f195d86703fa28d49fa8a27feeddc2b271f47025c8e5a147ae344cb6ca990403d67aa524c8364c1c7e6f4eb2c3590466ec1fdf9a541c337cade130689f289", @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./mnt\x00']) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/70, 0x46, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6d706fff7f0000000000003e687508000005ca32f8eed8354ca16f6eec006a3513d660d7740616d7ae9acb2c0e1be1b4451862039751fb0950200627d8c17d0891e91cff78efc260bea4ea342aba50994e04dd366de77877e87fe3f906"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x9, 0x1f, 0x0, 0x7, 0x0, 0x8000, 0x40, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000140), 0xd}, 0x230, 0x0, 0x8, 0x4, 0x200, 0x80000000, 0x401, 0x0, 0x0, 0x0, 0x5e}, 0x0, 0xd, 0xffffffffffffffff, 0x8) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="6289"], 0x1020) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r4, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@keyring) fcntl$getown(r0, 0x9) 03:25:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0xffffffff) preadv(r1, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/253, 0xfd}], 0x1, 0x0, 0x3) pivot_root(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file1\x00') r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES64=r2, @ANYRESHEX=r1]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r3, 0x4, &(0x7f0000000300)='ip6gretap0\x00', &(0x7f0000000440)='./file2\x00', 0xffffffffffffff9c) creat(0x0, 0x30) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='cpu.max\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000002c0)='ip6gretap0\x00', &(0x7f00000003c0)='./file2\x00', r4) 03:25:33 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffff}) mknodat$loop(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x281, 0x0) openat(r0, &(0x7f0000000340)='./file1\x00', 0x40, 0x80) openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x200400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x404c008) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x29, 0x0, 0x8, 0x80000001, 0x42, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x8708, 0x8, 0x100}}) getpeername(r3, &(0x7f0000000200), &(0x7f0000000300)=0x80) 03:25:33 executing program 5: clone3(&(0x7f0000000280)={0x880100, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0, {0x17}, &(0x7f0000000140)=""/55, 0x37, &(0x7f0000000180)=""/149, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x8}, 0x58) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x22, 0x7, 0x2, 0x80, 0x0, 0xde8a, 0x80801, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x4000, 0x7d7a, 0x6a3d, 0x1, 0x9, 0x3, 0x2, 0x0, 0xfff, 0x0, 0x1}, r0, 0x1, 0xffffffffffffffff, 0x1) clone3(&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 756.302706] Bluetooth: hci2: command 0x0405 tx timeout [ 756.362443] mac80211_hwsim hwsim22 wlan1: refused to change device tx_queue_len [ 756.379462] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 1025 (only 16 groups) [ 756.407741] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:25:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 756.546460] tmpfs: Unknown parameter 'mpoÿ' [ 756.642207] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 756.643872] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 757.012232] EXT4-fs warning (device sda): verify_group_input:146: Cannot add at group 1025 (only 16 groups) 03:25:47 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee01, 0xee00) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000180)='dns_resolver\x00', 0x0, &(0x7f0000000200)="009c5b58", 0x4, r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x97, 0x81, 0x0, 0x0, 0x5e, 0x120, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x424}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:25:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/4096, 0x1000, 0x0, &(0x7f0000000140)=""/118, 0x76}, &(0x7f0000000300)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x6805, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x10040, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e20, @rand_addr=0x64010102}}, 0x0, 0x0, 0x26, 0x0, "7832e109b23b8c772dbec617647866835bdd015bb0a2ed9547c6c0fbf4c39649f48e0fe8f8d9c2d86c5f2df142c9239b26e3c85edab1c3ede2b08688f9a95807898b002e64d29685025b8e351bf7b64c"}, 0xd8) setsockopt$sock_int(r1, 0x1, 0x19, &(0x7f0000000100)=0x9, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202692, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000200)) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x1c) sendto(0xffffffffffffffff, &(0x7f0000000280)="c96d2c55f3148944e2573cba2ef9d52641ed5deb9cb6ca70d3f0ca2fd067643e3f15c54bcc0bda339a824c2efade9b3f139aff7145a89b11376945f29ca47808", 0x40, 0xc010, &(0x7f0000000580)=@in6={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x100}, 0x80) 03:25:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$FIONCLEX(r1, 0x5450) r3 = open(&(0x7f0000000300)='./file2\x00', 0x1810c3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="af2b52e54ec67ae7deb1324f0d8eab25f7b0d24a75c26b26193918cd15d22dddbe3fa3e469ed7dae0a55d7791858675d195f8c376df31a536d161690b0492036258ba80a943a0331d754a59c51b59961", 0x50}], 0x1) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000080), 0xa668, 0xc0603) fallocate(r5, 0x10, 0x7, 0x100000000) r6 = fork() ptrace(0x10, r6) ptrace$getregset(0x4204, r6, 0x202, &(0x7f0000000140)={&(0x7f0000001280)=""/4096, 0x1000}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x3, 0x9, 0x0, 0x0, 0x9f, 0x80240, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x3, 0x1, 0x6, 0x1, 0x1400, 0x9, 0x0, 0x8, 0x0, 0xfffffffffffffff9}, r6, 0x5, r7, 0xf) fallocate(r4, 0x0, 0x0, 0x8000) write$binfmt_elf32(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x172) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x5f6, 0x1000}) 03:25:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x108) r4 = epoll_create(0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000100)={0x30000000}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f00000001c0)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x10, &(0x7f0000000140)=0x4, 0x4) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) read$eventfd(r6, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x7, @tid=r7}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x0, 0x40, 0x3, 0x7f, 0x0, 0xff, 0x20202, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x11544, 0x9, 0x7fffffff, 0x1, 0x9, 0x2, 0x7, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) dup3(r1, r2, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2, 0x0, 0x3}) 03:25:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:47 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) syz_io_uring_setup(0x200286f, &(0x7f0000000140)={0x0, 0xf292, 0x2, 0x0, 0x18f}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) fcntl$getflags(0xffffffffffffffff, 0x40a) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.time\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000003c0)={0x800, 0x1, 0x1f, 0xfffffff7, 0x4}) r1 = accept4$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @none}, &(0x7f0000000200)=0xe, 0x40000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) unshare(0x48020200) r3 = syz_open_dev$vcsu(&(0x7f0000000300), 0x2, 0x208801) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f00000000c0)={r4, 0x6, 0xffff, 0x80000001}) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x3f, 0x3f, 0x80, 0x6, 0x0, 0x7, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xffffffffffffffaa}, 0x6008, 0xff, 0x6, 0x0, 0x7, 0x9c75, 0xfffb, 0x0, 0x7f, 0x0, 0x4101}, r2, 0x10, r4, 0x2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x7, 0x5, 0x1f, 0x40, 0x0, 0x401, 0x4608c, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4405, 0x4, @perf_config_ext={0x2, 0x7f}, 0x8284, 0x9, 0x8, 0x0, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x64d}, 0x0, 0xf, r3, 0x8) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5dc0b085c8c7d3a1b9ddc15dea764e28add7b0ca224ca60404000000cd97c3d2008b4a488f6f03530675fa166a86157f7e6d2dc0a2e191ee45f63923d6ffc5f5e95c5100", @ANYRES16=0x0, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004841) 03:25:47 executing program 4: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x85) msgctl$IPC_SET(0x0, 0x1, 0x0) msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f00000000c0)=""/216) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r1 = msgget(0x0, 0xc) msgctl$IPC_INFO(r1, 0x3, 0x0) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000300)=""/220) msgctl$IPC_RMID(r1, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x200, 0xa0000) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r2, 0x6, 0xffff, 0x80000001}) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r5 = fcntl$dupfd(r4, 0x0, r3) writev(r5, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000240)=0x8) ioctl$KDFONTOP_COPY(r5, 0x4b72, &(0x7f0000000040)={0x3, 0x0, 0x17, 0x1d, 0x13f, &(0x7f0000000500)}) [ 770.376341] dns_resolver: Unsupported content type (156) [ 770.377365] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:25:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 770.452175] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 770.512499] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:25:47 executing program 2: clock_gettime(0x2, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, &(0x7f0000000140), 0x2040800, &(0x7f0000000240)={[{@data_err_ignore}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@bh}], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x36}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff0f44, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f8000020004000030000000000000001000000000000000200", 0x2e}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000011300)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5) 03:25:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:25:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:05 executing program 1: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_POWER(r0, 0x11, 0x9, 0x0, &(0x7f0000000040)) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x300000b, r1) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, r1) 03:26:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x800, 0x20, 0x5121, 0xfff}}, 0x40800) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c0000001a000101000000000000000000000000000000000000000071fdf5af2d6691f175ed929c4741226fd13ad98a97f7b79fea31e50d680f310218416d50dd562071865e3e212bdcf984c7947ebb44e2ba94641b4bbe559928838614bb56eaf8716f9cf92689d0e39a12ca8fcd8923b016fc64a6285acd645a68716aa3d1b15ec43f63578808f985572e26c28e8787aa041819243e84e9b265844f33b823cdf6bf516099c56045f23d81e4d6"], 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000400)=""/253, 0xfd}], 0x1) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) unshare(0x48020200) 03:26:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x20800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0500ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r1, &(0x7f0000000140)=""/7, 0x7) rename(&(0x7f0000001380)='./file0/file0\x00', &(0x7f00000013c0)='./file0\x00') mount$bind(&(0x7f0000001340)='./file0\x00', &(0x7f0000001500)='./file0/file0\x00', &(0x7f0000001540), 0x88002, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECV=@use_registered_buffer, 0x5) rename(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)='./file1\x00') write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x120) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/65) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001400)=""/210, 0xd2, 0x80010143, &(0x7f0000000180)=@file={0x0, '.\x00'}, 0x6e) sendfile(r0, r1, 0x0, 0x20d315) 03:26:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:05 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) chroot(&(0x7f0000000000)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x20c042, 0x0) r2 = fsmount(r0, 0x0, 0x82) close(r2) fallocate(r1, 0x10, 0x2103, 0xfdef) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000000c0)={r3, 0x6, 0xffff, 0x80000001}) r5 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r6 = fcntl$dupfd(r5, 0x0, r4) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000240)=0x8) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), r0) sendmsg$TIPC_NL_SOCK_GET(r6, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe8, r7, 0xa00, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfbdb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff8001}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x18}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x86}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x600}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 03:26:05 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x6, 0x80, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r1) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) clone3(&(0x7f0000000640)={0x20400, &(0x7f0000000180)=0xffffffffffffffff, &(0x7f00000001c0), &(0x7f00000002c0), {0x2d}, &(0x7f0000000500)=""/204, 0xcc, &(0x7f0000000340)=""/179, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r2}}, 0x58) sendfile(r5, r4, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) getsockopt$WPAN_SECURITY(r4, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000400)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e2f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31313037303533313000000000000000000000000000000000000000000000004832af767bb2faa1e6b7847222744afeeeec9c67580e2f", 0xd0, 0x400}], 0x0, &(0x7f0000013a00)) 03:26:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:05 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r0, 0x9e46, 0x0) getdents64(r0, &(0x7f0000001400)=""/53, 0x35) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='ns=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=mmap,cache=none,smackfsfloor=:,seclabel,\x00']) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x141043, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3a}}) pidfd_getfd(r0, r2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="1d0001d1e56819f57dccbd362547bca3f34c"], 0x340}}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x20, 0x6, 0x1f, 0x6, 0x0, 0x8, 0x400a, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x5, 0xa4}, 0x23, 0x3, 0x0, 0x9, 0x10001, 0xae99, 0x7, 0x0, 0x0, 0x0, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x0) 03:26:05 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) close(r1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/173, 0xad}, {&(0x7f0000000280)=""/152, 0x98}, {&(0x7f0000000340)=""/62, 0x3e}, {&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f0000000480)=""/68, 0x44}], 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="d64489160301dede000000000200ea00049e33e93296996a65f43d6bd16742482267aff97513c5d31c2ea29b89b1f11c88ff7b0d43d7381bd8f21301d7b61e2b29a193dcf97bce66945dc40a02c3b3f8dec1fce746bbc769176e54c58b4c81c501dafa030dd4d0ff9aefd1cad2c77a511f324dc60f3bec2b816006e70a51edd9f1dd5d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001001dd33e32033532090b9fe6706b00008c00136f9c939f2ca2705e2a03baeb13f7eb248315489295479dd25cb8ae97a8f6856069f3d38a5de494ee5ebe871ada1f2109327b7c5fb75ac88f07f88fc20147c05c743d72cea70e300d1874", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff], 0x60}, 0x21) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x4, 0x3f, 0xe, 0x5, 0x0, 0x9, 0x3840, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000680), 0xa}, 0x20, 0x0, 0x9, 0x8, 0x31, 0x7, 0x7, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x3, r3, 0x2) syz_open_procfs(r2, &(0x7f0000000640)='net/ip_vs_stats\x00') r4 = socket$netlink(0x10, 0x3, 0xa) copy_file_range(r0, &(0x7f0000000000)=0x6, r4, &(0x7f0000000040)=0x5, 0x9, 0x0) 03:26:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:20 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@nl=@proc, 0x80, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000060000000000100000000000000188bdc43f1cd84eae000f01f7ffffff00810000000000000000000000000000000000000000000063ec6e202349e2786fe0f30c0d5291044d2d9e6f93e661bd78eda5aec699936f5d7cc9e31a7d7a8dfa090b76685b9680e6d1e77c9bdc94e0a19b5c40556e85ad64d230c8a365add560403a4fc5727723bca9a75b358429dce7b3d09b927cf3"], 0x30}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000000240)={@desc={0x1, 0x0, @desc3}}) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x9, 0x4000010, r4, 0x8000000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7576}}, './file0\x00'}) r7 = syz_open_dev$vcsu(&(0x7f0000000280), 0xfffffffffffffffa, 0x618980) dup2(r7, r6) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) io_uring_enter(r6, 0x58ab, 0x0, 0x3, 0x0, 0x0) 03:26:20 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, 0x0, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004814}, 0x40) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x404101, 0x0) r0 = socket$inet(0xa, 0x3, 0xff) dup(r0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), 0x4) r1 = fork() r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x9, 0x8, 0x76, 0x0, 0x7, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x2d4d}, 0x580, 0x7d67, 0x0, 0x8}, r1, 0xd, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2200, 0x0) openat(r3, &(0x7f00000001c0)='./file0\x00', 0x20600, 0x180) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:26:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=ANY=[@ANYBLOB="680100001000010000000000000000000a010100000000000000000000000000fe8000000000000000000000000000aa00"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="16000000"], 0x168}}, 0x0) 03:26:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$AUDIT_DEL_RULE(r0, 0x0, 0x4008000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x843, 0x0, 0x0, 0x4, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x900, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e21, 0xe6c6, @local, 0x9}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40022020) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r1, 0x0, 0x80464c453f) 03:26:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(r1, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f00000000c0)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000000c0)={r3, 0x6, 0xffff, 0x80000001}) dup(r3) sendfile(r0, r2, 0x0, 0x100000001) 03:26:20 executing program 2: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="2e0092002f70726f632f7379732f6e65742f697076342f7463705f636f6e67657374696f6e5f636f6e74726f6c0000008629807e6882b0bceac9b4da1fc29c04721a77bdf74dbda719b2f8c281162334c91bc900000000"], 0xbc}, 0x1, 0x0, 0x0, 0x48040}, 0x200000c0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) readv(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/consoles\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x2c, 0x25, 0xc21, 0x0, 0x0, {}, [@typed={0x4}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000058c0)={@local}, &(0x7f0000005900)=0x14) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ftruncate(r4, 0x0) readv(r4, &(0x7f0000000100)=[{&(0x7f0000001180)=""/184, 0xb8}], 0x1) [ 803.551340] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 803.599992] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:21 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000be000000000000be252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000040)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0078d6092d23e70aa6e461c4b78c3ef5dcb924e49905ba7dffaf6ead6b2e363ae05b96"]) getdents(r0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) 03:26:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 803.709046] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:26:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x13, r0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) syz_genetlink_get_family_id$tipc2(0x0, r0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:devtty_t:s0\x00', 0x1e, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x28, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x28}}, 0xc080) syz_io_uring_complete(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) 03:26:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e27, 0x2, @private2, 0x5}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) 03:26:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="eb58906d6b66732e66617400028020000400000004f8000020004000030000000000000001", 0x25}], 0x802088, &(0x7f00000000c0)={[{@fat=@allow_utime}]}) openat(r0, &(0x7f0000000080)='./file0\x00', 0x8000, 0x80) 03:26:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x80005}, 0x20004800) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d9300000093550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x800}], 0x0, &(0x7f0000014a00)) mount(&(0x7f0000000140)=@sr0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x40000, &(0x7f0000000200)='$/\x00') 03:26:21 executing program 0: sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="16780029", @ANYRES16=0x0, @ANYBLOB="25760f18274601000000000000000000010000000e0001004e4c42"], 0x24}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x4004801) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)={0x2c, r3, 0x201, 0x0, 0x0, {{0x6}, {@void, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x4}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x2c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000040)='3', 0x1}, {&(0x7f0000000100)='5T', 0x2}], 0x2) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) io_uring_setup(0x5204, &(0x7f0000000040)={0x0, 0xc81e, 0x0, 0x2, 0xfffffffc, 0x0, r5}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000a72d2d7f7a6da482957e62aa70f6430100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x14, 0x80800) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x40000020, &(0x7f00000002c0)={0x0, 0x3938700}) unshare(0x48030200) [ 804.401387] kauditd_printk_skb: 14 callbacks suppressed [ 804.401405] audit: type=1400 audit(1702092381.809:45): avc: denied { relabelto } for pid=8581 comm="syz-executor.2" name="file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 03:26:21 executing program 1: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="00300210203235f4330c542cf4f4fe1bda5b1c3d275dd0d14fb5ceae040000000000000022001000", @ANYRES32]) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xee00}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x6c}, 0x0, @in6=@remote}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x7, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x80071, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r2) sendfile(r1, r3, &(0x7f0000000200)=0x81c, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) read(r4, &(0x7f0000000100)=""/188, 0xbc) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28}, {0x6}]}, 0x10) [ 804.424307] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2420000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31313435383439333100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003700000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010f00)="2000000064e828b364e828b300000000ddf4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000ddf4655f00"/160, 0xa0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000ddf4655f00"/160, 0xa0, 0x1700}, {&(0x7f0000011200)="c041000000300000ddf4655fddf4655fddf4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1e00}, {&(0x7f0000011300)="20000000000000000000000000000000ddf4655f00"/32, 0x20, 0x1e80}, {&(0x7f0000011400)="ed41000000040000ddf4655fddf4655fddf4655f00000000000002002000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000e736ebb30000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x1f00}, {&(0x7f0000011500)="ed8100001a040000ddf4655fddf4655fddf4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000006000000000000000000000000000000000000000000000000000000000000000000000000000000068cf8b090000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2000}, {&(0x7f0000011600)="ffa1000026000000ddf4655fddf4655fddf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3131343538343933312f66696c65302f66696c653000000000000000000000000000000000000000000000b6c73cca0000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2100}, {&(0x7f0000011700)="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", 0x1a0, 0x2200}, {&(0x7f0000011900)="ed81000064000000ddf4655fddf4655fddf4655f00000000000001002000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000802240f70000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2400}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011b00)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x8000}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000000080)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc000}, {&(0x7f0000012800)="0200"/32, 0x20, 0xc400}, {&(0x7f0000012900)="0300"/32, 0x20, 0xc800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0xcc00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0xd000}, {&(0x7f0000012c00)="000000000000000001000000000000000000000032ed2fbf0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x10000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x10400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x10800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x10c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x11000}, {&(0x7f0000013200)="000000000000000001000000000000000000000032ed2fbf0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0x11400}, {&(0x7f0000013300)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f0000013400)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x18000}, {&(0x7f0000013900)='syzkallers\x00'/32, 0x20, 0x1c000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x24000}], 0x0, &(0x7f0000013b00)) mkdirat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x4a) [ 804.490476] audit: type=1400 audit(1702092381.877:46): avc: denied { ioctl } for pid=8581 comm="syz-executor.2" path="/syzkaller-testdir776187138/syzkaller.bd3LT2/79/file0" dev="sda" ino=16032 ioctlcmd=0x6611 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 03:26:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 804.665860] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='~ELF'], 0xaf2) close(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='totmaps\x00') getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000000c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000100)=0x28) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 804.776148] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 804.923600] audit: type=1400 audit(1702092382.331:47): avc: denied { write } for pid=8581 comm="syz-executor.2" name="file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 [ 804.928262] audit: type=1400 audit(1702092382.332:48): avc: denied { open } for pid=8581 comm="syz-executor.2" path="/syzkaller-testdir776187138/syzkaller.bd3LT2/79/file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 [ 804.973080] audit: type=1400 audit(1702092382.380:49): avc: denied { relabelfrom } for pid=8581 comm="syz-executor.2" name="file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 [ 805.016668] audit: type=1400 audit(1702092382.422:50): avc: denied { getattr } for pid=283 comm="syz-executor.2" path="/syzkaller-testdir776187138/syzkaller.bd3LT2/79/file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 [ 805.021339] audit: type=1400 audit(1702092382.423:51): avc: denied { unlink } for pid=283 comm="syz-executor.2" name="file0" dev="sda" ino=16032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devtty_t:s0 tclass=file permissive=1 03:26:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x36, &(0x7f0000000040)={'security\x00', 0x112c, [{}, {}, {}, {}]}, 0x48) 03:26:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:38 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x18, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000002000028020000028400001b0000000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e39333730323938383300"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e971656294be4eee80012d67ccdc866e010000000c00000000000000dff4655f00"/64, 0x40, 0x6}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x800000000000540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000dff4655fdff4655fdff4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000dff4655fe0f4655fe0f4655f00000000000004000400000000000000050000000c00000000000000000000e0e300"/64, 0x40, 0x2200}, {&(0x7f0000011600)="200000004c3e14de4c3e14de00000000dff4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011700)="c041000000380000dff4655fdff4655fdff4655f00000000000002001c00000000000000000000000d0000000e0000000f0000001000000011000000120000001300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000dff4655f000000000000000000000000000002ea00"/192, 0xc0, 0x3400}, {&(0x7f0000011800)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000003a08c6c6000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x3600}, {&(0x7f0000011900)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001000400000000000000010000001400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009fdbabda000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000", 0xa0, 0x3800}, {&(0x7f0000011a00)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3933373032393838332f66696c65302f66696c65300000000000000000000000000000000000000000000059309ce2000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000", 0xa0, 0x3a00}, {&(0x7f0000011b00)="ed8100000a000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c657273000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067b843af000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000000002ea040700000000000000000000000000006461746106015401000000000600000000000000786174747231000006014c0100000000060000000000000078617474723200"/256, 0x100, 0x3c00}, {&(0x7f0000011c00)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000e0f4655fe0f4655fe0f4655f000000000000020014000000000000000100000015000000160000001700000018000000190000000000000000000000000000000000000000000000000000000000000000000000000000000000000068bed055000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000", 0xc0, 0x3de0}, {&(0x7f0000011d00)="ed81000064000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616ca13ce1c6000000000000000000000000000000000000000000000000200000004c3e14de4c3e14de4c3e14dee0f4655f4c3e14de0000000000000000000002ea04073401000000002800000000000000646174610000000000000000", 0xc0, 0x4000}, {&(0x7f0000011e00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x41c0}, {&(0x7f0000011f00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x6000}, {&(0x7f0000012000)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x6800}, {&(0x7f0000012100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x7800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x8000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x8800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x9000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20}, {&(0x7f0000012700)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0xa000}], 0x0, &(0x7f0000012c00)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000001c0)=0x31) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x73}}, './file0\x00'}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='zonefs\x00', 0x2050409, &(0x7f0000000140)='ext4\x00') 03:26:38 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x639d1876ab868171, 0x0) ftruncate(0xffffffffffffffff, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6, 0xfffffffe) fallocate(r2, 0x0, 0x0, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r4 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x101}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FICLONE(r4, 0x40049409, r3) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) r6 = fcntl$dupfd(r0, 0x406, r2) fsconfig$FSCONFIG_CMD_RECONFIGURE(r6, 0x7, 0x0, 0x0, 0x0) sendfile(r1, r5, 0x0, 0x100000001) 03:26:38 executing program 4: r0 = openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x10000, 0x2, 0x4}, 0x18) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/55) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffff3}]}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x3ff}}, './file0/../file0\x00'}) unlinkat(r2, &(0x7f00000001c0)='./file0\x00', 0x0) 03:26:38 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r2, 0x731}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002dbd7200fedbdf252a000000060006000000000006000400a0aa00000500360000000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc095}, 0x20000045) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') syz_open_dev$tty20(0xc, 0x4, 0x1) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x45ae, 0x0, 0x2, 0x3b2, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000340)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x7f40, 0x700, 0x40000, 0x5, {{0x14, 0x4, 0x2, 0x0, 0x50, 0x67, 0x0, 0x3, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, {[@ssrr={0x89, 0x2b, 0xde, [@dev={0xac, 0x14, 0x14, 0xa}, @loopback, @loopback, @empty, @remote, @private=0xa010102, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, @multicast2]}, @end, @generic={0xdb, 0x7, "8a7203d98c"}, @rr={0x7, 0x7, 0xfb, [@remote]}]}}}}}) io_submit(0x0, 0x2, &(0x7f0000000540)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)}]) 03:26:38 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000480)="8800170000040000001700080000000008007809140b2a3a0802a7", 0x1b, 0xb800}], 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="31c4a88a0730d056ef08cc9cef7a8bb9dc94d099725a352f79d94476876efb4b99822c99bf13012bd148e9013b34912b508c4e93290179c490a22e5897b4423ebec4ed0b5316e4c32aa757cf22be6fce150189e569d53283b0ba3c67850f803e8669868a5c8dd80a58492e9f050f9ed0550a4502282a9302eac450507b955701339aa2d556ef73fd9e5830bbe43db0113e7bb485b0e891d6580ef194da3f38e81d9c6b33e5ba482fdcd38c51e5cbede6419661f7bc7c537ffd11a10b620b20a58b"]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) ioprio_set$uid(0x3, r1, 0x4004) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000440)='./file0\x00', 0xfff, 0x0, &(0x7f00000015c0), 0x100041, &(0x7f0000001600)={[{@shortname_winnt}, {@shortname_lower}, {@shortname_win95}, {@uni_xlateno}, {@fat=@showexec}, {@shortname_win95}], [{@subj_role={'subj_role', 0x3d, 'vfat\x00'}}, {@context={'context', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x8a0b}}, {@euid_lt={'euid<', r1}}]}) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x400180, 0x104) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000140)="138665ed3c449cff7482abb7d2822ae80c5c2f7f75fa6c4e97a44a09325aa4816c924a037e1bcc309ac72bd4c2ffc20085eac982be80c8bec156b6321d64feef38cf63f5cbacc7564f", 0x49, 0x5}, {&(0x7f0000000280)="509ed7d3fd29243627e8a830ce4ed406cf846b914c74332312c65be60976810e03b232ec21ef029368afeca6dec0a8f6791ba0e57c0de3bd416677ee6a27da18879fe8aa4d857d66c7b44183bcc43183523d414a6e415aa0da028e13175d1c5d9acf49f24bdb59", 0x67, 0xe5}, {&(0x7f0000000300)="db832d3e0ee233f69d3a37c7e4020be7a7e155b4b69ae7335630b3b0cdc122108fd310af4cf4d481515d984097a1e8636b5234b4d8dc0431a8f3818ed046fa62eda73fdd1a681c918d9fbf9e62c681a5f44efba2c17240f31fb7d6bd44af508cd0cb6cc6556e36907e1cb1896c39e6a164c899e8a96ca828dcab9265926acdb75b", 0x81, 0x3}, {&(0x7f00000004c0)="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", 0x1000, 0x914e}, {&(0x7f00000003c0)="0f29c1a0d626888d48df0428053e26f83377d08491518af89dd84959f4f7288329c65e8ae746be989d41065db204200ee7e641d2af84f7a8b9266d680954eb8e2d93b2f75ea39627cde7b51365", 0x4d, 0xb6b2}], 0x20000, &(0x7f0000001540)={[{@uni_xlate}, {@numtail}, {@shortname_win95}, {@iocharset={'iocharset', 0x3d, 'iso8859-9'}}, {@utf8}], [{@subj_type={'subj_type', 0x3d, '['}}]}) 03:26:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:39 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) setxattr$system_posix_acl(&(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000b40), &(0x7f0000000b80)='./file0\x00', 0x0, 0x2, &(0x7f0000002d00)=[{&(0x7f0000000bc0)="99", 0x1, 0x8001}, {&(0x7f0000000c00)="a1b3", 0x2, 0xfff}], 0x1010081, &(0x7f0000002d80)={[{@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@uni_xlate}, {@uni_xlateno}, {@utf8}, {@rodir}], [{@context={'context', 0x3d, 'system_u'}}]}) [ 821.634803] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) lseek(r0, 0x800, 0x0) pwrite64(r1, &(0x7f00000001c0)="b3", 0x1, 0x8000) sendfile(r1, r0, 0x0, 0xffffffff000) r2 = openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) pwrite64(r2, &(0x7f0000000080)="5743f9e94b80fbad12cec05d57de8340368980cb7383b10d8424dab50d34ca81bd67", 0x22, 0x81) 03:26:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000140)={&(0x7f0000001280)=""/4096, 0x1000}) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, r1) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x6f, 0x4a, 0x4, 0x9, 0x0, 0x0, 0xc0400, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x0, @perf_bp, 0x3000, 0x80000000, 0x8, 0x9, 0x10001, 0x2, 0x1, 0x0, 0x182, 0x0, 0xffffffffffffffff}, r0, 0xd, r2, 0xe) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 03:26:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffebd, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8921, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x200000000000000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000140)={0x1f, @none}, 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) 03:26:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="cc0000b9be38f53de5c3fd7374b2df273b001b0001000000000000000000ffffffff000000000000000000000000ac1414bb00"/78, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0015000000000000000000"], 0xcc}}, 0x0) 03:26:39 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x1a, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x3a, 0x7c15c02d21e6d5c5, 0x0, 0x0, {0xa, 0x0, 0x2}}, 0x14}}, 0x0) [ 821.961541] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:39 executing program 7: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 822.148752] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:26:55 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) setns(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x5) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x401900, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f00000004c0)) 03:26:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000040)={0x3c, 0x4, '\x00', [@pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x7}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}, 0x30) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000003b2dc1d729ea01afa0d8dde96e5c4a96326db62353f01f8905551ba91cab12b4720f46a6a2b5ca647e8a1923f7ed45c54e4f81330a0d91e730b13fbfd2b11040b6cf2d5485727bf66c4030fb24699b3c5a1a8777c5829af5c99a92abda0bbdb01b250185bf45c96b78f981063b7572d8265757ff54fad801ceae4c86672d68c9631a23176a9c7eac71c43b3d4ca40febab1ade53a36d3e54aaafb9226a18b6c06d02f491873302bdf9d227cae5c3646b9d16433cf8fb35db13588eb4a661ed7431d11d5f23d75fcd0831a249", @ANYRES16=r1, @ANYBLOB="210100000000000000000600000008000300", @ANYRES32=r2, @ANYBLOB="04001780"], 0x20}}, 0x0) 03:26:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udp(0xa, 0x2, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setxattr$security_ima(&(0x7f0000000000)='./mnt\x00', &(0x7f0000000200), &(0x7f0000000300)=@v2={0x0, 0x1, 0x9, 0x2, 0x86, "a6bba180a922d9d6988ec27a1c0ad89733ffc67979dc46c0bd74d1ecec6597ba5f1f9be088e33e66f1090b4fdbd780ad15601297b90c97b470a3d19d1540e784cfd4e5adc47aa52c1fb85701eb3fe2d116eaa32b566546b92828230d20ca62251e9162ae078322c3298ba244ebb8172cd96526ee95e0a2ecfaffd50a491b06d3ddbc4a6fb9a9"}, 0x8f, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000500)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="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"]}) 03:26:55 executing program 7: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:55 executing program 1: ftruncate(0xffffffffffffffff, 0xffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x62) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) creat(0x0, 0x183) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) flistxattr(r2, &(0x7f0000000140)=""/4096, 0x1000) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r3 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20, 0x0, 0x400, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(r3, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x100000001) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) 03:26:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udplite\x00') lseek(r0, 0xfffffffffffffffa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000140)={[{@gid}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}}, 0x0) r2 = openat$incfs(r1, &(0x7f00000002c0)='.pending_reads\x00', 0x440, 0x258) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x1268, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000006, 0x30, r3, 0x4fe34000) preadv(0xffffffffffffffff, &(0x7f0000000b00)=[{&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000bc0)=""/212, 0xd4}, {&(0x7f00000005c0)=""/249, 0xf9}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000780)=""/149, 0x95}, {&(0x7f0000000840)=""/69, 0x45}, {&(0x7f00000004c0)=""/170, 0xfffffffffffffec4}, {&(0x7f0000000980)=""/149, 0x95}, {&(0x7f0000000a40)=""/183, 0xb7}], 0x9, 0x5, 0x200) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') close(r4) io_setup(0x7d9c, &(0x7f0000000240)) r5 = syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000600)=ANY=[]) mknodat$loop(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) 03:26:55 executing program 7: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:26:55 executing program 5: timerfd_create(0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$inet(0x2, 0x3, 0x80) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r1}, 0xc) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@empty, 0x6d, r1}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x124, 0x12, 0x8, 0x70bd2b, 0x25dfdbfd, {0xd}, [@typed={0x8, 0xa, 0x0, 0x0, @u32=0x6}, @generic="d05edfa64aeafb1709e4ab78edb100f7892bb454b502a0d0dd7df2dc65331a87de9fe51e6c3c64527f7304618969649e", @typed={0x14, 0x54, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3b}}}, @generic="ae09984430cfbed7476cddf6feacef807aa2fdb6109222d0214cd6a3ea91b300a1210bfb14c4ac7bd00d242014ffd939d082dcc90580d39166b5fea6ef96c13f592a475993c1abac2e67b54b22c1b42e5dbf33d81ffd6ed92a1fc27e7e3f39f54f52457a72c6d2a42b8701f41c7249f670d14c0449868e0ea2bee7300f0a723c752fb54a997593ec845758c93014b1be65ad4d015f12aa3f35883fd595c4b079083b10679cabd31c0447d82c24071f3f10be7cce1d06e27e85721d5913fdfa9afe"]}, 0x124}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000580)={0x0, 0x0, "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", "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"}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) sendfile(0xffffffffffffffff, r5, 0x0, 0x7ffffff9) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2f, 0x16, 0x9, 0x3, 0x4c, @rand_addr=' \x01\x00', @mcast1, 0x0, 0x8000, 0x93, 0x100}}) open(&(0x7f0000000180)='./file1\x00', 0x180, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() [ 838.321634] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 838.336533] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 838.990722] Bluetooth: hci2: command 0x0406 tx timeout 03:27:11 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:11 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) signalfd4(0xffffffffffffffff, &(0x7f0000000580)={[0x100]}, 0x8, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xa8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000003, 0x11, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x2a08, &(0x7f0000000000)={0x0, 0x1538, 0x1, 0x3, 0x2b}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd=r1, 0x8, 0x0, 0x3}, 0x2) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) r4 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x448343, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r6 = openat(r5, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x1b2) readv(r5, &(0x7f0000000180), 0x0) r7 = open_tree(r6, &(0x7f0000000600)='./file0\x00', 0x81000) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000640)) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0xe25, r0, &(0x7f0000000300)="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", 0xfb, 0xd3, 0x0, 0x1, r7}]) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file1/file0\x00', 0x4000, 0x22) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) 03:27:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x3, 0x80) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r3, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r4}, 0xc) sendmmsg$inet(r1, &(0x7f0000004ec0)=[{{&(0x7f00000003c0)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000480)="4acd95110765881bc082efa945d285ef1f40d308fa09854b56cd5e1d92efcccb7e67d8352615327d9ef8394da765a98789317d4ddaa50596d9b9bae8682d83fd5093ef44", 0x44}, {&(0x7f00000005c0)="935411e17c5819bd6dcb262af500988509cf61ed8fe97bd2f69310b5b79a89bccc747c774cda0213d40837d20f64173196c1822e7144085fcd20fcce6bb87b918f589a81", 0x44}, {&(0x7f0000000640)="dce6158a1b4541c64397a1e1ab7c62d76d8ef1c11bad4396c548152167fc9ea998a0d09ef57a0a8d679f324a602bd081218dea439a11fb12f15e08e4ba7e8906100ef8bb85a0e0c48a4f7c9c6c3770fcfaf43f8251881a3f9160a1dc8a83ebdce4dfb15a957dcfad18905ec6d080c3cbd96390e30f15b58894577c4ee7de7f2616b62fe08f2224443d5ce43462be35095c3610fd7a4e2d1c706be09ec6aca00d0862b67edad427e34bdb293294330f5f1741e1856bc02ba4a8b077d648f6b5a087677aa6f5bb7923ea0ba331ed4364702782a318bf7a6d54537eb4f2c54501faf690194934", 0xe5}, {&(0x7f0000000740)="f57a4133e16e5eb9cfbbcd024290d8a9873c29dccfbefe92a83680d26c027060cd6a421aeb72481e39da7dea00dc4b9f071a34e9a48f10ea5d13499342c5cf1d6c5dd6d89c84077740cc9f96186e56514e241303364d91673b80ac852322f43979e3671333", 0x65}, {&(0x7f0000000500)="b4256f0b523eac7778", 0x9}, {&(0x7f00000007c0)="3982785881cac8252f1503c06bb019f9de76c3ceaefac95485ebe3156641b881d4f14a25f0f7f4f3911699d74bbee31f93d2969652ef1b56cf2402c730385cba3fabda3cdd3af25a6d34f8d823fc", 0x4e}, {&(0x7f0000000840)="d777dee7ba455500a53f374e570bd1031eb514c017bd02b8f6eb1c4d0415558769bd5ae4d23510b7fd21023faa8d92db3316e96046c27620ba83f29faa4c13105735cdc675f7f17f5a9d5ee394737a8189d3074059ed4a4f1d36de3f61f6e4c438eb8290f8c970160d6cb5f3227b2397438b068c0401a8e00074d1a8d77c22788e0be2e0f123ff4adc4e8ceae1da4d2476871b4b490372a57c8688e70fa641757b55f1355c7d7bf1dc9d85c9d17de801627b33efc9b08b509305f00e1adb9eca9b59e5e6738ce4d273abc80880d280f67d205c6e7e98bfce90794ab4998b19ada4726cb3da3a8e048d298b3553a29d9e", 0xf0}], 0x7, &(0x7f00000009c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}], 0x48}}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000001a40)="258af65bd866", 0x6}, {&(0x7f0000001a80)="a0af7b8b046311479e74054bf2c05544da665d69da15e168", 0x18}, {&(0x7f0000001ac0)="a3672ff5a6c3df1796c529f74256681abfab7a40bd46b78fb9caa5311615339e7590e90c4eac4d20b5f69cb8d5aa12866ec51a42b8a03bbfd1404585a733e4f918c1b0fba4948f9e69759b99e057ff4da3b8e42afa6e7c722be3cadab3a1e3001c49748112c5ce7511b8e758636754194a29b4c14f85aadc59069931308e05b37b9f5a6091b2b96e68718795f8f28789efa4937ab899d5c19eff53a0c1243d64cfbb6db898ffd21b21cdb7b9f4c9b1ea7e5c4ce12fea73032aff7421ba74797c4cb740efa8bd8d49c3224532e735baf794de13984db5578fd629261250be03bfce61e1c48e741776", 0xe8}, {&(0x7f0000001bc0)="7c3cd93d9a7d3206d5c1a8ea64dc8b6e924db935eace7060a8725cd33759461051ab15a53d67e6f0363a777310a28dd8179642d159bc538ec0f3b2bdb40d59624787c0", 0x43}, {&(0x7f0000001c40)="3e35551f92e9f46637dfd7a6a3567bb0d3f7968efffd314ff5f604d2e0f02e969f0a56128b960c705243da0df7f3970bd8cadf87c30f0563d81dbfd06b1c420581799f6650b389684594bae73a61c9704931a79b265daf163b50c4618ef167b7eb9b70b21eb6f7b4914ecc8caa0320c6cc9b8d1d9ead12f0193ace5ba145937de17fdc1685f91d7a496d9aa494d39035c9fbeb2b5bc8bda7608287a943716bfbee3f528d839436fe4d112c284f98502a3474be45ab59d1ab9b8d76be73cf", 0xbe}, {&(0x7f0000001e00)="b88d6818ea8418090c2d1ecf26e8cd2b1ffbb678bd6d071c0223a9a044765f70f4a4b3d656e242bcbea7f8e759f3bdd472b3d64dee1bcf9131d49ae9ac2a4684d6ad806f3980373f6088d27e1b59e1e1de4df6ce0d75f8c94927761aa9a16d71283c70f55d670b65d65f5fcac89496c595b11af2a32dd19a4985317511b343861888263e53c9cf090934d5040991d3ef8dc74cb370", 0x95}], 0x7, &(0x7f0000001ec0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x24, 0x3, [{0x0, 0x4, "9a11"}, {0x5, 0x3, "a1"}, {0x1, 0x8, "fb0bd661a1d0"}, {0x6, 0xf, "4b71d63821c34191b216aef6ec"}]}, @timestamp_prespec={0x44, 0x14, 0x67, 0x3, 0x2, [{@multicast1}, {@private=0xa010102, 0x4}]}, @timestamp={0x44, 0x1c, 0x15, 0x0, 0x7, [0xffffffff, 0x4, 0xbca3, 0x8000, 0x79, 0x3]}, @end, @timestamp_prespec={0x44, 0x14, 0x13, 0x3, 0x8, [{@rand_addr=0x64010102, 0x106}, {@multicast2, 0xb48}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x23}, @rand_addr=0x64010102}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0xa}, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7fffffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x168}}, {{&(0x7f0000002040)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002180)=[{&(0x7f0000002080)="71a287201ae945093624e65f93d8e8751da833bdf8cc9c4f2e72b02a37261723037fa28a7e580a9f75b1137ac4588c81a7e35691c9e2556d64516a1b890b63c31e67eb902772cf864f5c1405f3410716add8a6c602efbc3ea58df6526eb422d09f55904bcccb052d5c110bcd97f1e08f5680e46464", 0x75}, {&(0x7f0000002100)="ad54be6b6895ca5fef6e400538aaaee62348ee04e600088e187f6df3ed20f6771e6716b417f475030822468fb26bc2ff8860d26c61f56248c31144b5b17d0c1cfe0fe0a7da6c88f7e6c3abe36d18b34f3a06038904382521", 0x58}], 0x2, &(0x7f00000021c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x180}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0xca}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfc6e}}], 0x60}}, {{&(0x7f0000002240)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000004780)=[{&(0x7f0000002280)="ae563b7b67ab9f9fe98653bfb75ce3e2cbc3911046ac149cfb45be5ea17c0be33de4d8eb6fc920c8bc355cad37ca678a982bb1bdabd36f7ebb474fc8611e5596701edd7c53bded694fd48083cc3352a8f4d5d8fe58fe75aa1d0bfd3ac9113f14bee6cc44acdcabf5b72675faacc9a84a4c264667dcde231705f83dd693416c48e4770648d2912e0ef68e6d6142e819d9f98b770fe3cfaa65daa11a95f6f5996ece3ef83511f220a44a", 0xa9}, {&(0x7f0000002340)="cdfdf9c6d173e8ced8bad0879b21075dce02ad4b5f9542ebb0186dced2e09eaa272c3b00d0faca96949cbbb644c0212755b54f0549a3d30e92092cf662119f6247bcca9770ada200fadbecc97a6d11eb73f0b83e9a42a25f617938a45d201c3228a83b49604e4c1cae51ac06fb8167fec42f6db0fc665cd63cfd5a30537dbac466d1f792df0d0d65eeb583cb7a9cfd5f7c05d139d0a46695b10bf6a2cf4d3ba54729ee5dda1d7813242a5e4d46f4e23af93dd6dac90fbe1e088e225b0ab1e4e5afe6b972d2b7b2", 0xc7}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="3427f97648ff46b680c011d2be6cf84622ed87dc4504b30d5a8348cefa108a22a997907a26e78782f6a272d5daf27597ad0b8d5012736004d4474796235986210c8d5fda7a57377d23ca65708005fdb3adef933fc0a254c0ae498237f331d3aca402bd701bc0dcbe16bf31d0eb814b7fa840e0c77e445b", 0x77}, {&(0x7f00000034c0)="2b809d32395c0cdbab60aec4fd9b8e72a18bc7c98937677a3142c4daee86307d4009199d2c00adafc244a16661ea8888f29b8208858be1eee799e46cada05692617e2046424224887feec1490221750551dfc85f5ae15682b35e821b34af8c6a03555a56472a9a88bf8e75933b2c7b13b199adefc5f5db50e49f484f23c5d710ece3d946da1ba016eeaee2917c438269a930af614a640efee73e28a7055d541fcc5a35d2aaec8e0f7d1ea1be61868b536cc2d9c0ff68b55fd379095cf800292fb88fc3909c40f9c3a1e6c067a91ab92e63c51a686567505bab4cb7897b0842d5a93d656fc74d24aa", 0xe8}, {&(0x7f00000035c0)}, {&(0x7f0000003600)="eb39529ab655ffe71b454e41833a624b2ad7db8c670ea9a87d85e773213e5b8f191bdc8291fd88216d6d4024ee29b91f183640bacb1449497f5834a78921c48a777e04f00b54279e472ad25425891d9e312f8d4d2633a15bd7679facdf439451bdff8c9443361ab0e4893ba9dc3d4b3f4f9e2b67f1fc2e5a2368953ed7d690ad1783825e120c201e7f2d5e2abbbb96838b8ed05229e6fbcacc01fcc2e7facc7b8c3b8ec2bd972f19cc4e16c77930d411921cd382bd6c34e3b32776cd1b", 0xbd}, {&(0x7f00000036c0)="086c373e6714e37d36c6c58db18ac6a25982d9a4a0b7b0c564a81e6bcee192b91f782a1b789d932f2245f29f297d3bb345ffd12e614bdf9a8e49d2f44bfd3ffbc854a868a95eb6e93bab879405b4445b4133074daa4078a87eabc075280bbd59ed9dacb67fdda656b40bd6fae781432fd660b2ffdc171f94afcc48bb7b26a7dcea7ea6c0bfc8c8f7391397", 0x8b}, {&(0x7f0000003780)="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", 0x1000}], 0x9, &(0x7f0000004840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x15}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_retopts={{0x38, 0x0, 0x7, {[@end, @ra={0x94, 0x4}, @rr={0x7, 0x23, 0x75, [@rand_addr=0x64010102, @private=0xa010102, @empty, @remote, @multicast1, @broadcast, @dev={0xac, 0x14, 0x14, 0x3e}, @dev={0xac, 0x14, 0x14, 0x10}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x3e, 0x0, 0x1, [0x0, 0x2, 0x5]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @remote}}}], 0xe0}}, {{&(0x7f0000004940)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10, &(0x7f0000004c40)=[{&(0x7f0000004980)="e65069ca3ca127865836203ba1f30aef81df2a9e0a158cb24db39929bdb8ee8e94ba10b3a9023e27f3e18829f519fc39c936ad9bde4d", 0x36}, {&(0x7f00000049c0)="ae4d2e8c8a357ea176ea9124835b0070f2e81f25e2937b26956697b068627b537fe2b1a5b0847d2b6152af42b2bbf0d6aaedaf14b82568dbd6bb9442800f4924901cf483f23d532157f8d1bbba174a1e86cc1b9e9cbfb0ae6b959749227e74de2f1b5a87203d01246935838f087747f0718f25a211a074e977131424326dda088ea2d677668c109492cbcf75cfcdeaf8dd1ac8ed40aa16462688b9b3f038ed9058", 0xa1}, {&(0x7f0000004a80)="acb9368c15eda111c0a53c15220892691ec6c4a04de8b5ebbe11bb8c0a0a4481793d8b4f869c23048b3e416eb5789537f2bc343ad7c73350b596b6069c9de53f611e55e92f9161559ea2822dafd6c649cf95e2e8d085f0f069d346c539c7e0130c445fb2292c7cf0237ee87f7de57808dbc9eca4cbf5c8b7cf30a2e054ceb3ae7365cedc0bca6240fbf1b4514ab331cfa30f62d1987ce8ce22895fd1696798", 0x9f}, {&(0x7f0000004b40)="78030afca10ad5e28a6af1a982b15dcc51307d8198ce65c1611fe7bf6a992c609cf2f392354566a5ad7a1724a8bd6be781d29b0e846ecaa8eb4c73f7489234b322ae154aea9f2b20e4fc09b950ccd82ac66d1027b731d400d3990198b3e15b296d9c7f16c8ae3d2c14b088dce8164385c6c90cfa43fe1b113f4049639fdcda18451e2c902c2335283041e5fbfef902294012a19c3cb90d4b21cd4bad341f1be2fa1a82dec1366e33fc398e0af9b923d6d5241956a97d8361a37335f2371cd9eb0addf4504f7d384ba8fdb0a95b5f9da15ff9b33e21e793056f6b58b382bb7e12b0", 0xe1}], 0x4, &(0x7f0000004c80)=[@ip_tos_int={{0x14}}, @ip_tos_int={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x1b, [@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x12}]}, @timestamp_addr={0x44, 0xc, 0xb4, 0x1, 0x0, [{@broadcast, 0x3f}]}, @generic={0x89, 0xe, "07e44d2da78632588a439ea7"}, @ssrr={0x89, 0x13, 0x28, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x2e}, @broadcast, @rand_addr=0x64010100]}, @timestamp_prespec={0x44, 0x54, 0x6f, 0x3, 0x2, [{@private=0xa010100}, {@broadcast, 0xffffffff}, {@dev={0xac, 0x14, 0x14, 0x1b}, 0x9}, {@multicast1, 0x9}, {@multicast2, 0xd2d3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x8000}, {@broadcast, 0xe2}, {@remote, 0xfff}, {@loopback, 0x82}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_retopts={{0xf0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0xbd, 0x1, 0x6, [{@empty, 0xab}, {@private=0xa010100, 0x4}, {@loopback, 0x10001}, {@rand_addr=0x64010100, 0x5}]}, @end, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x1}, {@broadcast, 0xffffffff}, {@remote, 0x227e1064}]}, @timestamp={0x44, 0x1c, 0xef, 0x0, 0x6, [0x6, 0x6, 0x9, 0x3, 0xf56, 0x20]}, @timestamp_addr={0x44, 0x3c, 0x41, 0x1, 0x6, [{@loopback, 0x1}, {@broadcast, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7fff}, {@broadcast, 0x9}, {@rand_addr=0x64010102, 0xc4f}, {@loopback, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xca3}]}, @rr={0x7, 0x27, 0xe7, [@local, @empty, @local, @rand_addr=0x64010101, @rand_addr=0x64010102, @empty, @private=0xa010102, @remote, @empty]}, @rr={0x7, 0x1f, 0x87, [@empty, @multicast2, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @local, @remote]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x238}}], 0x5, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) accept4$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @multicast2}, &(0x7f0000000580)=0x10, 0x800) syz_emit_ethernet(0x86, &(0x7f0000000080)={@local, @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x1, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "6bd60e8c561d4bbfed48726363582d54c82fee2b995254fa2817997b3828a500", "7d60fa6d1c0779e6cb3d5656f3959461", {"9e6946ecbd671680e02dce79b473ee4c", "ea9e52a8c1613f41ebf64e747375bc12"}}}}}}}, 0x0) recvmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/164, 0xa4}], 0x1}}, {{&(0x7f0000000200)=@nfc_llcp, 0xc4, &(0x7f0000000380)=[{&(0x7f0000000280)=""/17, 0xfffffffffffffd8e}, {&(0x7f00000002c0)=""/158, 0x9e}], 0x2}}], 0x2, 0x0, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) 03:27:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0], 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$lock(r1, 0x25, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) fsetxattr$security_capability(r3, &(0x7f00000000c0), &(0x7f0000000240)=@v1={0x1000000, [{0x4, 0x84b3}]}, 0xc, 0x0) 03:27:11 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48808}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$eventfd(r0, &(0x7f0000000140)=0xfff, 0x8) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffd, 0x7ff}}, './mnt\x00'}) ioctl$TIOCSIG(r3, 0x40045436, 0x3b) fcntl$setflags(r2, 0x2, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x80000001) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1f) open_tree(r4, &(0x7f00000000c0)='./mnt\x00', 0x9001) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0x8, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="84627faa59b90b3c271b651d73b8293002ce08096edded27d1e00849277eecfbee6f48b8ef10750daec5989e774c19b5c08b0b258192390800041b1e8067278469721fe23e1cca38b1b4154944bd1f936144e1bc98ac200e482380b45739c9d2b6ccd6d35e69faa0e4463237ce3a2b35653d8862369c98c11da8c06d1e1ae3e0558f4d3d6635e2d5c560745b3046b56c778960664ade438e4efca9df842faf79aabcd5133c012335365ed945838f0d1e8edd185a862f871df415d4bd636e49c950568d5d7922", @ANYRES64=r0, @ANYBLOB="200027bd7000fedbdf250100000008000200050000000800030000000000050006000100000008000300080000001000040001000000010000000100000010000400000400000500000001000000"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x4) getpid() unshare(0x40000000) unshare(0x48020200) 03:27:11 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x27c5}, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') r2 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x8) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000000c0)={r3, 0x6, 0xffff, 0x80000001}) r5 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r6 = fcntl$dupfd(r5, 0x0, r4) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000240)=0x8) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) readv(r2, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4089, 0xff9}], 0x1) 03:27:11 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 854.591518] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 03:27:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:12 executing program 3: r0 = open(0x0, 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0, 0x88, &(0x7f00000004c0)) r1 = syz_open_dev$vcsn(0x0, 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 854.707513] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:27:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 855.083518] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 03:27:12 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0], 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$lock(r1, 0x25, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) fsetxattr$security_capability(r3, &(0x7f00000000c0), &(0x7f0000000240)=@v1={0x1000000, [{0x4, 0x84b3}]}, 0xc, 0x0) 03:27:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 855.505495] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 855.514413] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:27:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000050040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f00000030c0), 0x17da00, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001e80)='./file0\x00', 0x290900, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/120, 0x78}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x2, &(0x7f0000001480)=""/193, 0xc1}, 0x200}, {{&(0x7f0000001580)=@l2tp6, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001600)=""/152, 0x98}, {&(0x7f00000016c0)=""/206, 0xce}, {&(0x7f00000017c0)=""/179, 0xb3}, {&(0x7f0000000400)=""/59, 0x3b}, {&(0x7f0000001880)=""/173, 0xad}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f00000019c0)=""/132, 0x84}], 0x7, &(0x7f0000001b00)=""/239, 0xef}, 0x6}], 0x2, 0x10120, &(0x7f0000001c80)={0x0, 0x989680}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000001e00)={{0x1, 0x1, 0x18, r0, {0xf8}}, './file1\x00'}) faccessat2(r1, &(0x7f0000001e40)='./file1\x00', 0x60, 0x200) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000002, &(0x7f0000000140)={[{@xattr}, {@cpuset_v2_mode}, {@clone_children}, {@noprefix}, {@none}, {}], [{@dont_measure}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_hash}]}) chroot(&(0x7f0000001d00)='./file0\x00') sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000003140)={0x538, 0x0, 0x300, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x401, 0xa}}}}, [@NL80211_ATTR_BEACON_TAIL={0x173, 0xf, [@preq={0x82, 0x4c, @ext={{0x1}, 0xf7, 0x99, 0x3f, @device_a, 0xffffffff, @device_b, 0x6, 0x9ea, 0x4, [{{0x1, 0x0, 0x1}, @device_a, 0x5}, {{0x1, 0x0, 0x1}, @broadcast, 0x2}, {{0x1}, @device_b, 0x400}, {{0x1}}]}}, @tim={0x5, 0xed, {0x1, 0xe6, 0x1, "d3ce04e370a2e5e414a53178c3cec8eac68d387d8652c338fabf4602f4fe94f5b561adb53ee343c1c7da5929f0c3589ad4afbbf9081518559d66e9b550eb7894e34f6063c249157041efcb4925a98d5747e64f25b7558d6e09670ef8dca08e2462ff79dcb526099cec25b0d694818adc319ec590ab0035cf6cc9797de79550645396174a015611accc067fc42a30818c6c1ba9d5787136c55d5730357fa197737bd2fdf18d51fdd915ad0de02b3312efad059e2ea980122bd7f3800f02d0cacb1a94549186c48c723b786dde623f996b0995b94d27acfaada63451ee06fa019617be123e16edb2e6109d"}}, @ext_channel_switch={0x3c, 0x4, {0x0, 0x4, 0xa9, 0x4}}, @mic={0x8c, 0x10, {0x809, "719a28b67290", @short="ecfcf3663bb16b50"}}, @challenge={0x10, 0x1, 0x2a}, @rann={0x7e, 0x15, {{0x0, 0x7}, 0x6, 0x8, @device_b, 0x7, 0x7, 0x5}}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x12b, 0x80, [@erp={0x2a, 0x1, {0x1}}, @measure_req={0x26, 0xc0, {0xb, 0xff, 0x1f, "bc1a68e923f74eb850a7cf9755401fa7285420b824da8055d5690ac569e1ffe9daeb255fe7683f6b5d25eece1001a0147d511a8dff661cd117c13cb377054daa3a0f246f2a5c53939c8a1660526fa5f78015bc9f2f4e956820b11f07ab585b3991efcf587c933b390ac00af54761d4a7eafda5753d2bde5e32ccd5e44422f1c5cfb07bd2ff407782fbc9d163fc352a65145562c5296bae184cc44d2dba56c3eb9eadbd4535442c484f05585bef0020f77b90635eab024d79b742a46a5c"}}, @rann={0x7e, 0x15, {{0x1}, 0x1, 0xb6, @broadcast, 0x3e, 0x0, 0x100}}, @link_id={0x65, 0x12, {@from_mac=@device_b, @device_a, @device_b}}, @link_id={0x65, 0x12, {@initial, @broadcast, @device_b}}, @gcr_ga={0xbd, 0x6, @broadcast}, @peer_mgmt={0x75, 0x16, {0x1, 0x81, @val=0x7, @void, @val="72fbfeacabead2a8e2416a283129f0db"}}, @sec_chan_ofs={0x3e, 0x1, 0x2}]}, @NL80211_ATTR_BEACON_HEAD={0x275, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x1}, {0xf5}, @device_a, @device_b, @random="da04c686ef35", {0x2, 0x9}}, 0x21e, @random=0x7, 0xc17, @val={0x0, 0x6, @default_ibss_ssid}, @val={0x1, 0x3, [{0x60, 0x1}, {0x5, 0x1}, {0x18, 0x1}]}, @val={0x3, 0x1, 0xac}, @void, @void, @void, @val={0x25, 0x3, {0x1, 0x9d, 0x2}}, @void, @val={0x3c, 0x4, {0x1, 0x80, 0xa, 0x81}}, @val={0x2d, 0x1a, {0x2, 0x2, 0x6, 0x0, {0x6, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x400, 0x100, 0x2}}, @val={0x72, 0x6}, @val={0x71, 0x7, {0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0xac, 0x61}}, @void, [{0xdd, 0x2f, "a8e43accf0f0ed78f0cdb0526be8c95fa9f22d4944b4f7e0ec03018d22c8f9d097f06d42576d9ad0d065e572a5692e"}, {0xdd, 0x2d, "2cd6fea88a0e79874f54f8a1bcde4f5d05c386697fdf47554070540e7d064c7ceeddf2aac65a31a78c529ba17f"}, {0xdd, 0x8c, "7b89e9af6a6b3da281c7f23a702cef41a92ed41e9a0f8a07a7eb633584da58c4ac4e73b02bcdefb936c9feb6f7991a8a2ea6ebb3486906270b3bedf4ba0b887135f6dfac949ab7adca132f73c34c137c3a4e8594edacc9c7b2decbc411b9367344c228173e2a05faaa78ed944d1e262ecd3fe1176948a82a962f946a5efcaba24f64e4ed95128ea1dc8ec099"}, {0xdd, 0x38, "9c44fccf480e8f70fe981f57ac09bddf9b8443f802b2141562fa8ad237cd6829e1f2fc0c5afb12ce7427fc83cb346595e5c256a14f6a7ab0"}, {0xdd, 0xdb, "7612022d783fec761082378f339b3dbf776bf01d330ad944580213bb1a1bc4d3626429e9f441cca0dc95508726b8c1405fc8920f4c2d813777ada8fb4bbd2940ce1a1ee245c653160cf9431cd9aafb40bce0f0cd2e69ecbe1d5982c10c6e5a51272cc942b1cdb5aeaca2d87a6208b20bb516331c0c65429f6284d9f9adf7ef04d0c6385d48e57d872e7e1352d85dad3eb3aae732f601d9d7edcb4d91577e00834f50b9113d1838dca230b9caa7783575d2d9f1931788ee383845c53563e3f7936d0f8f72869f3382413c01d880c0671afa5070b00f396c08554af6"}]}}]}, 0x538}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040801) recvmmsg(r1, &(0x7f0000003080)=[{{&(0x7f0000001ec0)=@generic, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f40)=""/200, 0xc8}], 0x1, &(0x7f0000002080)=""/4096, 0x1000}, 0x6}], 0x1, 0x40, 0x0) umount2(&(0x7f0000001cc0)='./file1\x00', 0x2) accept(0xffffffffffffffff, &(0x7f0000001d40)=@can, &(0x7f0000001dc0)=0x80) [ 855.760390] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 03:27:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:13 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone3(&(0x7f0000000340)={0x2000000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100), {0x1e}, &(0x7f0000000200)=""/234, 0xea, &(0x7f0000000140)=""/114, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0], 0x5, {r0}}, 0x58) ioctl$EXT4_IOC_GETSTATE(r1, 0x40046629, &(0x7f00000003c0)) pwrite64(r0, &(0x7f00000000c0)="a3", 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r2}, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000480)={'batadv_slave_1\x00', 0x0}) r4 = socket$inet(0x2, 0x3, 0x80) connect$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r4, &(0x7f0000000000), 0x400000d, 0x100000000000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000180)={@broadcast, @remote, r5}, 0xc) getsockname$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000640)={&(0x7f00000006c0)={0xfc, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0xc00}, 0x14004000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r7, 0x0) r8 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r9, &(0x7f00000000c0)="a3", 0x1, 0x0) dup2(r9, r8) 03:27:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0], 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$lock(r1, 0x25, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) fsetxattr$security_capability(r3, &(0x7f00000000c0), &(0x7f0000000240)=@v1={0x1000000, [{0x4, 0x84b3}]}, 0xc, 0x0) 03:27:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) r6 = io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r7 = eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r7, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffda, 0x6}, 0x4202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = fsmount(r5, 0x0, 0x8) execveat(r8, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='\\$-!$@+^\xfe\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='\x00', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x100) r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r10 = dup2(r6, r5) openat(r10, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r9, 0x0) 03:27:31 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x80000) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0/file0\x00', 0x210000, 0x34) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd6096151700283aff00000000000000000000000000000001ff02000000000000000000000000000189009078000055b20a2e2f4d9721ed5d6f990d6f9cd716c260378b227b424b21fb4bd6eae773ba3011f156f0a591d430b09b3ebfa2d70de707659fb8ff97ca0ddc1895d9453994b8e901b55a2234e5d10133d41600bc72769e0856fb7219567982ed11c1c1"], 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) dup3(r1, r2, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x6, 0xffff, 0x80000001}) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r5 = fcntl$dupfd(r4, 0x0, r3) writev(r5, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000240)=0x8) pread64(0xffffffffffffffff, &(0x7f0000000440)=""/92, 0x5c, 0xfff) write$tun(r0, &(0x7f0000000080)={@void, @void, @x25={0x1, 0x8, 0x0, "df77ab3f46f6b2c29a5ca95837cc14881e8c97288541a3f2b2c152167d59bccd75"}}, 0x24) write$tun(r5, &(0x7f00000001c0)={@val={0x0, 0x88e5}, @void, @ipv4=@tipc={{0x15, 0x4, 0x0, 0x3, 0x194, 0x67, 0x0, 0x7, 0x6, 0x0, @empty, @loopback, {[@rr={0x7, 0x7, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @generic={0x86, 0xf, "60366539f22487b601f5ad6a64"}, @generic={0x86, 0x4, 'V5'}, @rr={0x7, 0x23, 0x99, [@multicast2, @local, @local, @broadcast, @rand_addr=0x64010100, @broadcast, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}, @name_distributor={{0x140, 0x0, 0x0, 0x0, 0x1, 0xa, 0xb, 0x2, 0x7fff, 0x0, 0x0, 0x3, 0x6, 0x0, 0x4e23, 0x4e24, 0x0, 0x3, 0x0, 0x0, 0x1}, [{0x7, 0x6, 0xfffffc00, 0x1, 0xbff6, 0x100, 0x3, 0xffffff8}, {0x8, 0x40, 0x40, 0x3, 0x0, 0xfffffffb, 0xa, 0x448}, {0x641, 0x7, 0x400, 0x6, 0x6, 0x9, 0x3, 0xd9f}, {0x3, 0x800, 0x2, 0x3, 0x2, 0x7, 0x8}, {0x80, 0x0, 0x0, 0x1, 0xfff, 0x0, 0x2, 0x80}, {0x90, 0x9, 0x8, 0x2, 0x6, 0x1, 0x7, 0x40}, {0x7fff, 0x80000, 0x0, 0x4, 0x7, 0x81, 0x3, 0x4}, {0x1, 0x0, 0x5, 0xfffffff7, 0x2, 0x200, 0x2, 0x4}, {0x8000, 0x64f, 0x2, 0x1, 0x0, 0x7, 0xf, 0x1f69}, {0x8001, 0x1, 0xffffffff, 0x5, 0x6, 0xfff, 0xc, 0x6}]}}}, 0x198) 03:27:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:31 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, 0x0, 0x24000000) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x84}, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r2, 0x6, 0xffff, 0x80000001}) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) fcntl$dupfd(r4, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="05000000ffffffff2e2f66696c653000ac75382884529718c87439a27e2752006665eb03363ffbc76a593eee0a68f67902ec1bcc52b9f52c817b4d2be5a65ec29d5dffbe6d59462f3f5042c173461a028847fd729a37a4ee40000101ea1be28eb688f38b87a876b353e85b4e7477a02799"]) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 03:27:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 874.829546] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 874.845570] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 03:27:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 874.994508] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 874.996732] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 874.998164] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 874.999540] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 875.001100] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 875.003975] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.005164] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.007226] Buffer I/O error on dev sr0, logical block 0, async page read [ 875.008901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.010126] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.012226] Buffer I/O error on dev sr0, logical block 1, async page read [ 875.013910] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.015834] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.017861] Buffer I/O error on dev sr0, logical block 2, async page read [ 875.019564] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.020787] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.022993] Buffer I/O error on dev sr0, logical block 3, async page read 03:27:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 875.033834] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.035043] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.037085] Buffer I/O error on dev sr0, logical block 4, async page read [ 875.038752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.039940] blk_update_request: I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.041949] Buffer I/O error on dev sr0, logical block 5, async page read [ 875.043576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.045954] blk_update_request: I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.048032] Buffer I/O error on dev sr0, logical block 6, async page read 03:27:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) dup3(r1, r2, 0x80000) [ 875.091813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 875.093046] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 875.095051] Buffer I/O error on dev sr0, logical block 7, async page read 03:27:32 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x639d1876ab868171, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x101}, 0x4c20, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r5, r4) linkat(r3, &(0x7f00000001c0)='./file1\x00', r4, &(0x7f0000000200)='./file1\x00', 0xc00) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/160, 0xa0}], 0x1) sendfile(r0, r1, &(0x7f0000000180)=0x9, 0x6) sendfile(r1, r2, 0x0, 0x100000001) 03:27:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000300)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0], 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/udp6\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$lock(r1, 0x25, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0x8020}) readlinkat(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)=""/192, 0xc0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10}) fsetxattr$security_capability(r3, &(0x7f00000000c0), &(0x7f0000000240)=@v1={0x1000000, [{0x4, 0x84b3}]}, 0xc, 0x0) 03:27:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x80, 0x0, 0x0, 0x0, 0x5e, 0xc04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa1, 0x800000}, 0x0, 0x4adfe4b8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x9, 0xffffffffffffffff, 0xa) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) copy_file_range(r0, 0x0, r2, 0x0, 0xa1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="f9ffffffffede61ab857ffffff2e2f66"]) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) open(&(0x7f0000000200)='./file0\x00', 0x400001, 0x100) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="0a00180003030303030300002c00700004000400050006000000000004000700020002000000000005000100000000000500020000000000"], 0x54}}, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x280, 0x0) sendmsg$IPSET_CMD_DESTROY(r8, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x3, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x4000004) sendmsg$NL80211_CMD_AUTHENTICATE(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="5d442dbd7000fddbdf25250000000c009900ffffff7f290000000a003400010101010101000008003500020000000a00340002020202020200001f003400bb9112578adde6469a40b78620d6d7f57ce3d95ee19a614ca1121e00"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x804) socket$inet6_udp(0xa, 0x2, 0x0) [ 875.796321] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 875.811212] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 875.910558] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 0 [ 875.912395] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:27:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$CDROM_GET_CAPABILITY(r1, 0x5331) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340)=0x1f, 0x7) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={@ipv4={'\x00', '\xff\xff', @local}, r2}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6gre0\x00', r2, 0x4, 0x7, 0x70, 0x1, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x7800, 0xffffffff, 0x8000000}}) openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x18000, 0x4a) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/tty/ldiscs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1040, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x3}, 0x10010, 0x263, 0x0, 0x2, 0x800}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x11, &(0x7f0000000100)=0xfffffff8, 0x19) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x3d8, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1}, 0x1c) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f0000000400)={0xb}) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x1) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) 03:27:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x10000000) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000004c0)=ANY=[@ANYBLOB="4091565cdbfa48931fc20a1542ffd55db5ea6d18e3b27e753db9825124b9a2b5bc", @ANYRES32=r0, @ANYBLOB="0852000004d3735500c761460f666900"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100), 0x1000000000000073) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) r6 = syz_open_dev$vcsu(&(0x7f0000000100), 0xffffffff, 0x200000) getdents64(r6, &(0x7f0000000500)=""/192, 0xc0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r5) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x2}) getpid() r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) dup2(0xffffffffffffffff, r7) 03:27:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x2000}, 0xc) syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)) r2 = openat$incfs(r0, &(0x7f0000000100)='.log\x00', 0x0, 0x0) write(r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) getdents64(r4, &(0x7f0000000140)=""/166, 0xa6) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = dup(r4) linkat(r2, &(0x7f0000000040)='./file0\x00', r5, &(0x7f0000001940)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000000)={0xaa, 0x2}, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000004c0)={0x0, 0x1, 0xffffffffffffffff, 0x8d}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 03:27:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 890.180780] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:27:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x2, 0xaf, 0x40, 0x7f, 0x0, 0x7, 0x2800, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6a59270, 0x2, @perf_config_ext={0x3f, 0x9}, 0x8040, 0x37f, 0x5, 0x0, 0x0, 0x4, 0x200, 0x0, 0x80000001, 0x0, 0x3ff}, 0x0, 0x3, r0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',cache=none\x00\x00\x00\x00\x00\x00\x00\x00floor=:,\x00']) fcntl$getown(0xffffffffffffffff, 0x9) fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 03:27:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x263d, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000240), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x0) stat(0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x100000001) 03:27:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="23f2d6b1bb3f8f1be8c70ea06e0e6861c8a65f7637aca304ef1287f2852319091e1a423d7f56a586907747fb809c3d9f31d54b7d2d6144cf01cb020ebeb8101379ff62fc9a20f5b94e346b349d1c9e35eff499a6a0bf3d519dafa9833b7ac93ffcf82b16cf1ca7d284eb27ddfe13bb34d32561ef9f2d059d523f5d86e8938f932437d9fb37278eb1cd22b68a0a2c8060c0c6e3dafb7a95dfa4e7706ec010b20d5cf93ad3faccd971b6dfe1b8fe454e5fcfbeb415eda7ddc9f6e0eae450b09f9ce36c5c1e396046fa00fb5922c1f140778bbb5d46cdd137"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x8, 0x0, 0x0, 0x151, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = dup2(r4, r4) io_uring_setup(0x3, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x31f, 0x0, r1}) syz_io_uring_submit(r2, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x80, &(0x7f00000001c0)=@sco}, 0x0) eventfd2(0x8, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000040)={0x3, 0x2}) io_uring_enter(r1, 0x76d3, 0x80, 0x1, 0x0, 0x0) r6 = fsmount(r5, 0x0, 0x8) execveat(r6, &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000bc0)='\x00\x80C\x107\xa64\xee\xbd*\xd4o\x8a?[\x98\xf29\xee\xc7\x90\x97\xaa\xc3\xc8Zq\xf3\x91\x04[S\\B2m=V\x89\x99\x96Q\xcaA\x18\xaf\xaf:\xf1\xab\x80\"\x7f\xb3\x18\xfe\xd7\xbd\xcd\xcdIf\xae\xb5\x87\xb8#\xe1\xbe\xec\xf0\t\xa1\xf7\xa7\xb1\x9d\xc7\xc2\xf0\x02\xaf\xc4\xd0@\xc2\x12\'\xb9\x9a\xea\x90e%\xe6\xd2E\x19E/\xc6\x17gB0Qim\x82u\x0fZ\xa9\x14\xf5\xc7X\xa9\x00\xb7\xaf\xcfouN\xbd\xb2\t^\xbe&~\xa7l\xfa\x036\x1c\"\x80\xfc/\x9b\x95\xf1!K\xc5{\xe7\xfdB[\xca\x87\x9bc\x98dg\x1a\xa1\xaa\xb4\x19\x7f\xa7\x90y\x9fq\xf5\x8a\xa9 \xa6\xdd\xf0+gb\xa6g\\\xec\tz\x06\xdf\x1a\x9c\xc9\xf7\xcc\x85\xb4G\xe9\xd3D\xf4\x8c\n\x17\xd5\x00\xf18\xb3T', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000a00)='\x009\x1c\xaf\x14\xe6\xeb\xe9\xf1\xccO@\xbd\xfc\xbdN\xfa\x93Z\x94\xfd\xc6]\xc3\x81g\x95\'\xb7\xf2\xe8\xbf\xd3\xf3\"\xf0Z\x93T\xa1\xc6\x10\x01\xba\xf0\x11\x01 \x94X\x7fQ\xa6\v\xfa\xc2\\$\xad\x96A\xd6\xdf|\x0e,c\xc4\x13\xfb\x91\xc5|{\xde\'xb\xcd\xb2\x177\x83\'\xdb\xf6y_\x10\x87\x01\xd4\xb1\x9b\xe4\xac\xf0D4\xe6v\x86\x02^bt\xbf!b\xd4k\x11\xf5Nj\x97P\b\xf2\xdd\r\xaa,g\xfc\x8f*\bq\x10wl\xe0\x02HG)\xa0\xb9%\x12\x9fx]\xf8Gz`\xfd\x00l\xe9<\xa5\xbd\x9f\x80\xa5\x0f\xd3\xf7\xc8\x98'], &(0x7f0000000840)=[&(0x7f0000000600)='[*\x00', &(0x7f0000000000)='\xff\xb1\xc2k\xc9\xbf1Q\x9e^\x9a\x9dOW\xa5\x0el\xd2~\xa7%\xa5 \rZ\x81l\xa6\x97\xc6\xb90S\x04\x9b\xcb', &(0x7f0000000680)='\x00', &(0x7f0000000940)=']\xadt\xe0\r\xa3\xd7\xe8\x91\x90\n\x03_\x85\xa9\'E\xae\"\xeb]DE\xa3w\x8b\x94\xf7Yf\x03\x00\xd2:-\xab7\xd0\xf6\x0e\x903U\xe1\xe2\x8cS*HC\x17\xa0}@\xf4.\x87]\xed\x1f\x1e\xe8;\xfd\xee$\x8f\xba\xa5@\"\x93\xf7yR\x95z\x95\xc4\x03{\x11\xbe\xb3e\xb8B\x13\xa3uh\xcf\x11\xc7{Y\x0fp\x031\xb1/b_mq\x96\xccc\xa7\xbb\xb4T\x00J\xd7\xb8\n\xd4\xd9B\xa9\xec\xc5\xb5\x0e\xf1Q\x03\xbcX\x8d\xb2\xf6^\xb9\xc8\xa5\xdc\xa5\xcb\xde\xd3\xd03\xcc\xbe\xed\x9b\xbd\xcbb\x91\x98\x80\xe1X(t\xda\xd3F\x02\xa9\xa0\x81\xce;{\xfa\xba\xa3,{\xe87\xf6\x0f\xf9M\xb5mz', &(0x7f0000000700)='\x00', &(0x7f0000000740)='\x00', &(0x7f0000000100)='!\x00', &(0x7f00000007c0)='\x00', &(0x7f0000000800)='\x00'], 0x1000) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)=0x2b8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r8 = dup2(r0, r4) openat(r8, &(0x7f00000000c0)='./file0\x00', 0x200040, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r7, 0x0) [ 890.576623] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 890.585135] 9pnet: Insufficient options for proto=fd [ 890.588559] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 890.604532] 9pnet: Insufficient options for proto=fd 03:27:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 890.643292] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:27:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 890.966063] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 1: setresuid(0xee00, 0xee00, 0xee01) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x8, 0x1, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r2, 0x6, 0xffff, 0x80000001}) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r5 = fcntl$dupfd(r4, 0x0, r3) writev(r5, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000240)=0x8) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) io_submit(0x0, 0x4, &(0x7f0000000680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x5, 0xffffffffffffffff, &(0x7f00000003c0)="dc951faae3a75eca758e11b28f63229aec9c9a85e1a4a32ff90c15f09049c44a3f105410c8c3e05297bac10e97d3c49ef30212dc33f2d09b74e13e3739c94a117a9e6eb9ad767361c2665fbe9ae995889a845f6e8c8a241f0c42b10c123201d540c2ae18c6643d7a8c51085573d1cce1f9e93ab23cfd4df884432d0a1ff2312da041954ec34a3c1b0ddf02f0002710a77269d55bb4fbcecab1d16155f8ec7256494d4a7792507366f4832bb5a6dab887f9a4f660ea6c00e97fe1391f1812aa1071c55388210f01d154bec023f20eaed3af56a9d82b6629de83ba42efe942fa2ea39a", 0xe2, 0x7, 0x0, 0x4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x9, r5, &(0x7f00000004c0)="f504e116ed4716307fdada3c7c2ec7c53d881b471d1a06e0f47889f899d83b", 0x1f, 0x1, 0x0, 0x2, r0}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f0000000540)="99b2d29b0e46285731bfe696d57174ec7f6020fe18f87bcad41202ed0009531d02d2db162a192a8a82b0216fd9d8cf2a867db043df792d331638e90c03ddf132d67e7452", 0x44, 0x5, 0x0, 0x0, r6}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x6, 0x7, 0xffffffffffffffff, &(0x7f0000000600)="f8f48e9cc5aead7da182a4ef5bd2abda064df75112039a", 0x17, 0x5, 0x0, 0x2, r0}]) r7 = add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000280)="0b199c1237a875ce03b255ec78bdbc4be27baca3f0d9734c8335041d161eaa95104e45e40dffd0647b900efe54dd9618a77a0e5cf285f41a3b4e2d8911aee08500301419", 0x44, 0xfffffffffffffffc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$revoke(0x3, r7) keyctl$chown(0x4, r7, 0xee01, r8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000006c0)=ANY=[@ANYBLOB="010009004ab3ee54e8884911170000000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r8, @ANYBLOB='.\x00']) mq_open(&(0x7f0000000700)='$\x00\xfe%\n\xe1\xa9\xb4\x8f\xdbtz\xf1\x06\xfd\\\xda#rC`\x8a\xa5\xf0\x8e\xfd\x8c1\xf70\xf8\xf3x\xf3\x96\xbdy\x9b\x06\x00\xc9V\x0f\x06\t\xda\x92\xc9\xcb\x18\xe2\n\x97\'*\x93\x9c\xa6V\xbe\xd5\xdc\xdc\xfa\xc2\xb4\xe5W.\xd5-4\xce\xfbx-J\x01\xb7\x8a\xd6\x8cp\xd5\x94\xf5\x93\xfa\x14\xcd\x90\xd5\x05\xb43V\xbe\x10\xe2\xed\xb1\x18\x8d\xdf\x1b \xf8V\x99\xc5D\xd6M\xe0\xf5\x18l\xd0\xcc\xcc\xe2\x99\xee\xa1>\x93X\x9b\xf7\xa3~\xcc\x90f4\"\xa3l\xb9\xc1\x8a\xef#Xl!\x9bpo\xc6h\r\xaf\xf6\x96MRp\xe7\v\x89\x85\xd2\xa0k\x8f\xe3\x04]\xe3\xc2\x17\xb6N\xda(7\x10S\xe6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00f\'\x03~\xddm\x91\x12\xd1\x807\xdf\xa9L\xf7\x96\x8du\b\xa8$%\xc3Q*=\x041\x10Zq\x86\xc5\xd6 \xbf\x0f\xcd\x88\x10#}\x1c\x81a\xfa[\xcb\xd2v\x7f\xf9\xe0\xa8\xae\xfbNrE\'\x8b\x90\x9e\xa3\x95\xa9\xa1?\x9d\x9d4Y\x92\xe2i\x90\xcc\x15\xc3V\xfcF\xa4\x17\x9f\xbd\xec.{\xb5Z2\xc8\x04t\x1f\t\xf8\x98A\xb1\x87^\r`\xdc\xb7\xd7L\x9c\x1dI\x9d\xb9Q\xa0 \xf8b#\x90\xf5\xceT\xa9\x90\xbe\xf0~\x1aY2\x9c\x92\xe3s\xa9\xa0h\xcb\xb5Z\x94\xbei\xd0\xb8u\xab\xf3\a\x03\x84(c\xbe\xf0gg\x05;\xd8\x9dqM\xf5\xa4\x9dp\x02\x9b\xa4\xe6\x0f-\x1a\xe1=9', 0x40, 0xc2, &(0x7f0000000000)={0x4, 0x1000, 0xb520, 0x2dd}) 03:28:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000300)={0x1f, @none}, 0x8) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 2: ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='uid_map\x00') sendmmsg$inet6(r1, &(0x7f0000000240)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8001}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000180)="553431bc9275623e7c728de917d164f6b8a7f148aa54f846720ab159e73490c31e61a93c1f5aadf1aaab081fc7916e47cc8899f8778e", 0x36}, {&(0x7f0000000300)="8de7e64c1f38c28da481a5e187353669b1d316d299c7f542a185cde0bb79ae9be5c67a149892a633012beb6ba8d449766f3e205626be06f04fb89ad0dde6b7095d93ff1a4f7202c076fa11ed9eeabd32f00f19dff473690dd459f9c73f3ed4c40ac21017a54a93c42c7ef36eb69e77961763d16785d0c18cf5c0200f4e4d1f4c47572e7972130768399f4a35a77ce93d32246ef7b4869c0adbd4ab", 0x9b}, {&(0x7f00000003c0)="1e7e173a6cee92290dac0cdc914b7696e79ce15edabba6371bed36545b27499dd68a24b1610e89fb1c2afa842b56ee4777124e3a1409387b58e52fb15c213eeb1e2592f4394541cbdb356ae86eb755063db5573387432dab9b420ab81862406359047dd3c292a68e8f82e26d0d7245efacf298532ccfc3c45737631a4f6ff7e01c5e50b6cef09519b12ddbcd043c0d9bb093cf712cdf21f61591", 0x9a}, {&(0x7f0000000480)="55a6edd591020f38a0e7dcb046a41e7799841a65d063d0e540d5771a67b191ec6b826ca6a959a68a0b8f7ce0d50c530783ba1d56b1aa45d886ec395203a2b2c744c7780012dbe6d107773cdd", 0x4c}, {&(0x7f00000001c0)="88e0f8c5e32af958aa65e63832e2329a77df8da2d910c8513790dc4ec53ff7cc2cb14f1c34261b9d553d30d81b5ec5717e", 0x31}, {&(0x7f0000000500)="d856b3306ff9806e8d79bd412ce6bfc630203b7e89a84c7ae6bfb2374f6a3ec8c7e87120e96b3f83521102fe689ae5a245c278238a4e2071b9d2c0f7b834ed2449621f5e711577ed7f2034e7887eef31d9dfd7a5ea0d539c9cd0001baf62546c9d0ab3cbbe7f52fa198b691fadc5d1355d8fec39cea0548bd2581e23785834540eba4429596170e514763b9fa2a6029897809922d7c90e2ea838df9c96052f35b5f2b7491d04789804bf", 0xaa}, {&(0x7f00000005c0)="73a1b9d6587d707924d385bf825ada33c2fd68b93c77255a7119926c532f8e1e701910ee6f50fb3df8c67d2c2de5b70266c7afcf40bdf873f9d7e8f8a9dc448716ca4bd5c920e2302c03455b9a98f0946cf024e13fe92cb5fa87c49c48dcb8e034041c40f0b98497f5c941fa8239de517a33df", 0x73}, {&(0x7f0000000c00)="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", 0x1000}], 0x8}}], 0x1, 0x811) flock(0xffffffffffffffff, 0xa) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffe, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x404c008) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000a80)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) sendmsg$inet6(r3, &(0x7f0000000a40)={&(0x7f00000006c0)={0xa, 0x4e21, 0x800, @loopback, 0x5}, 0x1c, &(0x7f0000000880)=[{&(0x7f0000000700)="a3288d0bac97860dfe4f7506700637b1a22a1ed959e0b8a6a60788f46f9bf1e3d2d428cd99abb85cd196ac9c47efe49cdc7421da1474ce7c22768cfd6d7d0bc3c947f8f76381a8352fc3cd58c1c7b3c5b70b0fbb0b7efcb529e285bd605758f3a39a215e39fa6b591817b7a06bd47653b353b964fe658dee3b8aad72b56cb88707a6038b7cc64f6c40d3ea56c18547e47757b714951bc7d0326bc248e2747fcfd3a65228dd9791e784de", 0xaa}, {&(0x7f00000007c0)="faaf9817c92c0943fe9b9652aca05d7a692116c492e0eb6b2676580ac30fdb751afbceb3e53636fe861b153a298bf07d2cc57407e07db5f9dfb1d3c9c0b4604d2f81d63b46f03e64b9b52a7c1d97", 0x4e}, {&(0x7f0000000840)="0152140c7843462df529245904de8149f30521316781276177f187b6", 0x1c}], 0x3, &(0x7f00000008c0)=[@rthdrdstopts={{0x58, 0x29, 0x37, {0x4, 0x7, '\x00', [@calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x2, [0x10001]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @enc_lim={0x4, 0x1, 0x81}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @pad1, @enc_lim={0x4, 0x1, 0x1}]}}}, @tclass={{0x14}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x2, 0x6, 0x2, 0xff, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2={0xfc, 0x2, '\x00', 0x1}, @empty]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x3b, 0x4, 0x2, 0x4, 0x0, [@mcast1, @private0]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @multicast1}}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @hopopts={{0x40, 0x29, 0x36, {0x3c, 0x4, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @pad1, @ra={0x5, 0x2, 0x100}, @jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x10, {0x3, 0x2, 0x3, 0x7fff, [0x3]}}]}}}], 0x170}, 0x4840) [ 903.669438] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 903.689987] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 903.691953] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000100)=0xc03c, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x8001) write(r1, &(0x7f0000000080)="f26765", 0x3) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x4022812, r2, 0x0) 03:28:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:01 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r1, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000bc0)={'syztnl0\x00', &(0x7f0000000b40)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1, 0x8, 0x60, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x20, 0x4, 0x8}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x1c, 0x0, 0xb00, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x480d5) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$F2FS_IOC_SET_PIN_FILE(r4, 0x4004f50d, &(0x7f00000001c0)=0x1) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001480)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x9, 0x8001, 0x8, 0x0, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r6) writev(r5, &(0x7f0000000580)=[{&(0x7f0000000000)="4fa479d2250cbe02f2d573ecffc7d93c59ef75518d16a8912ba896", 0x1b}, {&(0x7f0000000040)="cffb8ce453da81abbd104933b49be84bda4f452e31aa193111a24fe09bb9055a00a0beeda01154421d515b9ae1ca34a39e4cffd37d7ba13232a262225c426cdecaa880a34b797c66", 0x48}, {&(0x7f00000000c0)="b3d39d4945c91fa3a4beea63547ebe451c649e0cbebb72a959f0d9e2244835a75813cfee4ccfc5c1eaa652158110420c780e8cd2e305d49c1c5d89edffad50a5d30ff40db083957fb780ffb90de4a5732fcc04f698226d121d957533c0929d4f91", 0x61}, {&(0x7f0000000280)="81a33a44d0ed0d16e31682ea03363332489eb09b0a2e0499f5a4137156aa01424eb71829cd7c0287e40729947f148406f30f83921c66b5ac64a38042f4135a284122413b4aff4e1da18e3b6e76e09fe8f27bec9fd0f332e9ad611f0553bbd7353614f8082e53d3483abffcfb68049834d3197b4244eb2b3fb6e44b0486a9bf4751ec44fa2162eda9148dd03fb083691346bb795372599587121b0b1a46b6a34ba66162ef5f19e9010ce85d2609e23a92b06dcc9e81124ffd35d5b59dee685c349a33c41acd7fb42a0c624c67b7b38556b322f085d1b82f6338fe2cc36d736a58a45984ce7cc50c853c71f2783164ae98a35a25d51c55b5594bef4d363f45", 0xfe}, {&(0x7f0000000380)="dec784b1da82a3ae76eccf17957f38077a3c7cf6584c1a76c0cd5a37a0537dcf02d551bc02902729ea72681ae668f2c168104ac6605f75308570f549d9a94270c4c8f93d106eb9318d063e335b7b5f6319c0b28840a3eb8ea429e055850dbaca30b592db7fc9c4bf503329f6f66e910e0e5f71f3bd434dd6098f6402cd7603c80963361dea02d76ee7d5c3eea030a7516d3ce873f487f968177fa6b39c8231ec821569c9c3e6ab2fa346b4b032edeb1aa1ed46433a9a95be1c3290dba4cb866dffb2facf2b2b810fd7249639a86eb6343af1b1bbded4f6475ebee74881e829f4ff22c4034c5a6195db614e1fafe048234dda28", 0xf3}, {&(0x7f00000001c0)}, {&(0x7f0000000480)="d3a64cceadf461c3fdc99307b90ad70a356a9ade524e16658721758abca6ebe31d45e2e784cb08cd3c2722496dcd2ab8cc4569c3723782a49ef2af46ef8fd4799045770ef4197656e8c8cbc51a6c5ad6f89fc24dd04165ddd6e58eb2432f4ccedc98494c59fc039e5e91a095568702118f2d1688b856587accbfc0df19bf68d3c28ad3f839bd4826372deef5452855009d0e7886d36a124c9c809dd396677aee29c9d748c972ca92a886e8c2122987a486f686528474acd922e55dfbad940d4fa89a6f886823ff12a91c991783d454bb189a9573d99e9fe841", 0xd9}], 0x7) sendmsg$NLBL_CALIPSO_C_ADD(r6, &(0x7f0000000240)={0x0, 0x900, &(0x7f0000000600)={&(0x7f0000000180)={0x24, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000640)='./file0\x00', 0x2bc, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="07e811543b7069f0fa2faba99ad6403a9d5d36f62d2b036f4c39f9046987086e6f92912ba7a1c1edf8a5877c1937e900d57900bce1d5c6f5a567f0ca7f2a06f504099a22a171a807b62049f7a36593b5a44adaea8bcf2e01f2359128c0c1bc1001433dfb464f4724aeb5a85fdb670c3d96885faf73c52cb7a5ccc737f6", 0x7d, 0x4}], 0x2020000, &(0x7f0000000740)={[{@size={'size', 0x3d, [0x78, 0x6d]}}], [{@smackfsfloor}, {@audit}]}) 03:28:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 904.220760] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 904.222590] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r1, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000bc0)={'syztnl0\x00', &(0x7f0000000b40)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1, 0x8, 0x60, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x20, 0x4, 0x8}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x1c, 0x0, 0xb00, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x480d5) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$F2FS_IOC_SET_PIN_FILE(r4, 0x4004f50d, &(0x7f00000001c0)=0x1) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001480)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x9, 0x8001, 0x8, 0x0, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r6) writev(r5, &(0x7f0000000580)=[{&(0x7f0000000000)="4fa479d2250cbe02f2d573ecffc7d93c59ef75518d16a8912ba896", 0x1b}, {&(0x7f0000000040)="cffb8ce453da81abbd104933b49be84bda4f452e31aa193111a24fe09bb9055a00a0beeda01154421d515b9ae1ca34a39e4cffd37d7ba13232a262225c426cdecaa880a34b797c66", 0x48}, {&(0x7f00000000c0)="b3d39d4945c91fa3a4beea63547ebe451c649e0cbebb72a959f0d9e2244835a75813cfee4ccfc5c1eaa652158110420c780e8cd2e305d49c1c5d89edffad50a5d30ff40db083957fb780ffb90de4a5732fcc04f698226d121d957533c0929d4f91", 0x61}, {&(0x7f0000000280)="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", 0xfe}, {&(0x7f0000000380)="dec784b1da82a3ae76eccf17957f38077a3c7cf6584c1a76c0cd5a37a0537dcf02d551bc02902729ea72681ae668f2c168104ac6605f75308570f549d9a94270c4c8f93d106eb9318d063e335b7b5f6319c0b28840a3eb8ea429e055850dbaca30b592db7fc9c4bf503329f6f66e910e0e5f71f3bd434dd6098f6402cd7603c80963361dea02d76ee7d5c3eea030a7516d3ce873f487f968177fa6b39c8231ec821569c9c3e6ab2fa346b4b032edeb1aa1ed46433a9a95be1c3290dba4cb866dffb2facf2b2b810fd7249639a86eb6343af1b1bbded4f6475ebee74881e829f4ff22c4034c5a6195db614e1fafe048234dda28", 0xf3}, {&(0x7f00000001c0)}, {&(0x7f0000000480)="d3a64cceadf461c3fdc99307b90ad70a356a9ade524e16658721758abca6ebe31d45e2e784cb08cd3c2722496dcd2ab8cc4569c3723782a49ef2af46ef8fd4799045770ef4197656e8c8cbc51a6c5ad6f89fc24dd04165ddd6e58eb2432f4ccedc98494c59fc039e5e91a095568702118f2d1688b856587accbfc0df19bf68d3c28ad3f839bd4826372deef5452855009d0e7886d36a124c9c809dd396677aee29c9d748c972ca92a886e8c2122987a486f686528474acd922e55dfbad940d4fa89a6f886823ff12a91c991783d454bb189a9573d99e9fe841", 0xd9}], 0x7) sendmsg$NLBL_CALIPSO_C_ADD(r6, &(0x7f0000000240)={0x0, 0x900, &(0x7f0000000600)={&(0x7f0000000180)={0x24, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000640)='./file0\x00', 0x2bc, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="07e811543b7069f0fa2faba99ad6403a9d5d36f62d2b036f4c39f9046987086e6f92912ba7a1c1edf8a5877c1937e900d57900bce1d5c6f5a567f0ca7f2a06f504099a22a171a807b62049f7a36593b5a44adaea8bcf2e01f2359128c0c1bc1001433dfb464f4724aeb5a85fdb670c3d96885faf73c52cb7a5ccc737f6", 0x7d, 0x4}], 0x2020000, &(0x7f0000000740)={[{@size={'size', 0x3d, [0x78, 0x6d]}}], [{@smackfsfloor}, {@audit}]}) 03:28:14 executing program 2: r0 = inotify_init1(0x0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5}, 0x1c) r2 = memfd_create(&(0x7f0000000080)='ext4\x00', 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r2, r3) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000007cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000850) r5 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x80102, 0x0) fcntl$dupfd(r1, 0x0, r6) inotify_add_watch(r5, &(0x7f0000000140)='./file0\x00', 0x12000440) rmdir(&(0x7f0000000000)='./file0\x00') 03:28:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 3: close(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/libata', 0x82800, 0xc2) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000100)={0x0, 0x0, '\x00', 0x1, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x891b, &(0x7f0000000240)={'syz_tun\x00', 0x0}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="8ab200000000000002004e22ac1e0001000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000ac1e000100000000000000000000000000000000000000000000000000000000000000000000000400"/272], 0x110) unshare(0x48020200) r2 = syz_open_dev$mouse(&(0x7f0000000080), 0x8001, 0x101000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e21, @private=0xa010100}, {0x2, 0x4e22, @private=0xa010100}, {0x2, 0x4e22, @empty}, 0x201, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000000c0)='team_slave_0\x00', 0x3ff, 0xfffffffffffffffa, 0x1}) 03:28:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 916.776218] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 916.840370] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:14 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 916.879860] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 917.548425] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r1, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000bc0)={'syztnl0\x00', &(0x7f0000000b40)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1, 0x8, 0x60, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x20, 0x4, 0x8}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x1c, 0x0, 0xb00, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x480d5) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$F2FS_IOC_SET_PIN_FILE(r4, 0x4004f50d, &(0x7f00000001c0)=0x1) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001480)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x9, 0x8001, 0x8, 0x0, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r6) writev(r5, &(0x7f0000000580)=[{&(0x7f0000000000)="4fa479d2250cbe02f2d573ecffc7d93c59ef75518d16a8912ba896", 0x1b}, {&(0x7f0000000040)="cffb8ce453da81abbd104933b49be84bda4f452e31aa193111a24fe09bb9055a00a0beeda01154421d515b9ae1ca34a39e4cffd37d7ba13232a262225c426cdecaa880a34b797c66", 0x48}, {&(0x7f00000000c0)="b3d39d4945c91fa3a4beea63547ebe451c649e0cbebb72a959f0d9e2244835a75813cfee4ccfc5c1eaa652158110420c780e8cd2e305d49c1c5d89edffad50a5d30ff40db083957fb780ffb90de4a5732fcc04f698226d121d957533c0929d4f91", 0x61}, {&(0x7f0000000280)="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", 0xfe}, {&(0x7f0000000380)="dec784b1da82a3ae76eccf17957f38077a3c7cf6584c1a76c0cd5a37a0537dcf02d551bc02902729ea72681ae668f2c168104ac6605f75308570f549d9a94270c4c8f93d106eb9318d063e335b7b5f6319c0b28840a3eb8ea429e055850dbaca30b592db7fc9c4bf503329f6f66e910e0e5f71f3bd434dd6098f6402cd7603c80963361dea02d76ee7d5c3eea030a7516d3ce873f487f968177fa6b39c8231ec821569c9c3e6ab2fa346b4b032edeb1aa1ed46433a9a95be1c3290dba4cb866dffb2facf2b2b810fd7249639a86eb6343af1b1bbded4f6475ebee74881e829f4ff22c4034c5a6195db614e1fafe048234dda28", 0xf3}, {&(0x7f00000001c0)}, {&(0x7f0000000480)="d3a64cceadf461c3fdc99307b90ad70a356a9ade524e16658721758abca6ebe31d45e2e784cb08cd3c2722496dcd2ab8cc4569c3723782a49ef2af46ef8fd4799045770ef4197656e8c8cbc51a6c5ad6f89fc24dd04165ddd6e58eb2432f4ccedc98494c59fc039e5e91a095568702118f2d1688b856587accbfc0df19bf68d3c28ad3f839bd4826372deef5452855009d0e7886d36a124c9c809dd396677aee29c9d748c972ca92a886e8c2122987a486f686528474acd922e55dfbad940d4fa89a6f886823ff12a91c991783d454bb189a9573d99e9fe841", 0xd9}], 0x7) sendmsg$NLBL_CALIPSO_C_ADD(r6, &(0x7f0000000240)={0x0, 0x900, &(0x7f0000000600)={&(0x7f0000000180)={0x24, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000640)='./file0\x00', 0x2bc, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="07e811543b7069f0fa2faba99ad6403a9d5d36f62d2b036f4c39f9046987086e6f92912ba7a1c1edf8a5877c1937e900d57900bce1d5c6f5a567f0ca7f2a06f504099a22a171a807b62049f7a36593b5a44adaea8bcf2e01f2359128c0c1bc1001433dfb464f4724aeb5a85fdb670c3d96885faf73c52cb7a5ccc737f6", 0x7d, 0x4}], 0x2020000, &(0x7f0000000740)={[{@size={'size', 0x3d, [0x78, 0x6d]}}], [{@smackfsfloor}, {@audit}]}) [ 917.570956] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 917.634971] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:29 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r1, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000bc0)={'syztnl0\x00', &(0x7f0000000b40)={'ip6_vti0\x00', 0x0, 0x29, 0x7f, 0x1, 0x8, 0x60, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x700, 0x20, 0x4, 0x8}}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x1c, 0x0, 0xb00, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x480d5) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$F2FS_IOC_SET_PIN_FILE(r4, 0x4004f50d, &(0x7f00000001c0)=0x1) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001480)={{0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x9, 0x8001, 0x8, 0x0, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r6) writev(r5, &(0x7f0000000580)=[{&(0x7f0000000000)="4fa479d2250cbe02f2d573ecffc7d93c59ef75518d16a8912ba896", 0x1b}, {&(0x7f0000000040)="cffb8ce453da81abbd104933b49be84bda4f452e31aa193111a24fe09bb9055a00a0beeda01154421d515b9ae1ca34a39e4cffd37d7ba13232a262225c426cdecaa880a34b797c66", 0x48}, {&(0x7f00000000c0)="b3d39d4945c91fa3a4beea63547ebe451c649e0cbebb72a959f0d9e2244835a75813cfee4ccfc5c1eaa652158110420c780e8cd2e305d49c1c5d89edffad50a5d30ff40db083957fb780ffb90de4a5732fcc04f698226d121d957533c0929d4f91", 0x61}, {&(0x7f0000000280)="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", 0xfe}, {&(0x7f0000000380)="dec784b1da82a3ae76eccf17957f38077a3c7cf6584c1a76c0cd5a37a0537dcf02d551bc02902729ea72681ae668f2c168104ac6605f75308570f549d9a94270c4c8f93d106eb9318d063e335b7b5f6319c0b28840a3eb8ea429e055850dbaca30b592db7fc9c4bf503329f6f66e910e0e5f71f3bd434dd6098f6402cd7603c80963361dea02d76ee7d5c3eea030a7516d3ce873f487f968177fa6b39c8231ec821569c9c3e6ab2fa346b4b032edeb1aa1ed46433a9a95be1c3290dba4cb866dffb2facf2b2b810fd7249639a86eb6343af1b1bbded4f6475ebee74881e829f4ff22c4034c5a6195db614e1fafe048234dda28", 0xf3}, {&(0x7f00000001c0)}, {&(0x7f0000000480)="d3a64cceadf461c3fdc99307b90ad70a356a9ade524e16658721758abca6ebe31d45e2e784cb08cd3c2722496dcd2ab8cc4569c3723782a49ef2af46ef8fd4799045770ef4197656e8c8cbc51a6c5ad6f89fc24dd04165ddd6e58eb2432f4ccedc98494c59fc039e5e91a095568702118f2d1688b856587accbfc0df19bf68d3c28ad3f839bd4826372deef5452855009d0e7886d36a124c9c809dd396677aee29c9d748c972ca92a886e8c2122987a486f686528474acd922e55dfbad940d4fa89a6f886823ff12a91c991783d454bb189a9573d99e9fe841", 0xd9}], 0x7) sendmsg$NLBL_CALIPSO_C_ADD(r6, &(0x7f0000000240)={0x0, 0x900, &(0x7f0000000600)={&(0x7f0000000180)={0x24, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000640)='./file0\x00', 0x2bc, 0x1, &(0x7f0000000700)=[{&(0x7f0000000680)="07e811543b7069f0fa2faba99ad6403a9d5d36f62d2b036f4c39f9046987086e6f92912ba7a1c1edf8a5877c1937e900d57900bce1d5c6f5a567f0ca7f2a06f504099a22a171a807b62049f7a36593b5a44adaea8bcf2e01f2359128c0c1bc1001433dfb464f4724aeb5a85fdb670c3d96885faf73c52cb7a5ccc737f6", 0x7d, 0x4}], 0x2020000, &(0x7f0000000740)={[{@size={'size', 0x3d, [0x78, 0x6d]}}], [{@smackfsfloor}, {@audit}]}) 03:28:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) fcntl$setlease(r2, 0x400, 0x1) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) utimensat(r1, &(0x7f0000000140)='./file2\x00', &(0x7f0000000180)={{0x0, 0x2710}}, 0x100) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=@acquire={0x134, 0x17, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in=@multicast1, {@in=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, [@sec_ctx={0xc, 0x8, {0xfffffecd}}]}, 0x134}}, 0x0) copy_file_range(r1, &(0x7f00000000c0)=0x56cb, r3, &(0x7f0000000100)=0x6aa, 0x2, 0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) close(r2) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0x10001, 0xa2050, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x240, 0x7, 0x0, 0x7, 0x0, 0x7, 0x9, 0x0, 0x2}, 0x0, 0xc, r2, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, &(0x7f0000000340)) lseek(r1, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r4, 0x0, r1, 0x0, 0x200f5ef, 0x0) 03:28:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 0: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 6: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 0: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 932.039504] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 932.051678] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 932.056582] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 0: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 932.440041] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 932.458879] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 932.526342] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 932.541169] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x7, 0x101202) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f00000000c0)={r2, 0x6, 0xffff, 0x80000001}) r5 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r6 = fcntl$dupfd(r5, 0x0, r3) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000240)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000500)=[{&(0x7f0000000440)="3fbe3968b2079ccf6cbc8734e06b97c5f56694b3b5bea614cc5ee548ae375d3afc4fe2bece035bdc610d0f9e82be31b13c5b5fedae08fbe70712522e172fe4a8c6d1c781373f8d963fb14b4bd2b642f80b3b28f0d7f2f7d72bfba659cb241b130dd5ec96b5381102a7e2ce8723c6c59a05cb2de04b63fb493e42b0b7dee0d33cfbae2cd480cc3dbe9f9bac846f3c5d8f3eb8d15d0ad5ddc029d30b99ccc33843e69a4b8f8193eb7e00563f808853648f1e4e5dbe3b", 0xb5}, {&(0x7f0000000600)="bd5d27bf6d2b5c397994ef66ebdde2f00cd6d550a6495bd6e0ca71aeec79aaa61dfe8c57d425fee37fb6fe008c824a8d6c73102063c2038d9a181248a71715d34defefa2d4393d2d0c0d88809c101cd9c9b21dc007378979f5bd5fc72c57b3b9ec901d360ace4d160c9d624677326ae5b11d7c37885590e37da07f3747d35b8bcd0a22609537b1b9d89b5da4c467724066dfb5e173263650903da3834099acc71f210e422493833995a94616fb8476dc9e9a25e33574017d4bcbefbf88676db57eaeadc5a29266", 0xc7}, {&(0x7f0000000340)="3ea85be177d660d3b8d247ea8b9a4ab2d1af4680196824657f9bcf4aa4f08eb9db9be27cf2022f0839bb0f841453d2e1c44183babc7b4a6496e0a32d098e7d8a8a9fc9d30819e63cd4ad267801", 0x4d}, {&(0x7f0000000200)="03d1d3dc9a30b0919ea6d6ae1553707acb2f62daa60c25420b0a832af3652ffa1891d99976fb13c50baa801397516cd47009", 0x32}, {&(0x7f00000002c0)="88bedfd2633d117d0d242283a8bde1b2797389841bbe70c5897c39ddda7ebf18ffde9bcffcb533108aea4d1a3fd3913e", 0x30}], 0x5) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r8, 0x0) r9 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000001c0)=[r6, r0, r7, r0, r8, r9], 0x6) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) pwritev(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)="f1", 0x1}, {&(0x7f0000000180)="89", 0x1}, {&(0x7f00000005c0)='s', 0x1}], 0x3, 0x0, 0x0) finit_module(r0, &(0x7f0000000080)='!:-\\*@^\x00', 0x0) 03:28:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 946.784014] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 946.822616] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:44 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 946.849351] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 4: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 947.200028] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 947.243047] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:28:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 4: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 4: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) close_range(r0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:28:59 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 962.548981] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:13 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 975.983248] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 975.985498] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:29:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 976.194426] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 976.222228] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:27 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 990.436133] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 990.482449] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:27 executing program 1: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:29:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 990.725570] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:43 executing program 2: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:29:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 1: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1006.006499] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue [ 1006.019549] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:29:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 1: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 2: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:43 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1006.467805] EXT4-fs (sda): re-mounted. Opts: journal_ioprio=0x0000000000000000,,errors=continue 03:29:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) 03:29:57 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 2: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1020.152007] FAULT_INJECTION: forcing a failure. [ 1020.152007] name failslab, interval 1, probability 0, space 0, times 1 [ 1020.154444] CPU: 1 PID: 9253 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1020.155828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.157491] Call Trace: [ 1020.158061] dump_stack+0x107/0x167 [ 1020.158826] should_fail.cold+0x5/0xa [ 1020.159594] ? getname_flags.part.0+0x50/0x4f0 [ 1020.160536] should_failslab+0x5/0x20 [ 1020.161333] kmem_cache_alloc+0x5b/0x310 [ 1020.162169] getname_flags.part.0+0x50/0x4f0 [ 1020.163071] getname_flags+0x9a/0xe0 [ 1020.163821] do_mkdirat+0x8f/0x2b0 [ 1020.164539] ? user_path_create+0xf0/0xf0 [ 1020.165408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1020.166466] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1020.167516] do_syscall_64+0x33/0x40 [ 1020.168273] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1020.169326] RIP: 0033:0x7f82ca377c27 [ 1020.170077] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.173806] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1020.175340] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca377c27 [ 1020.176788] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1020.178223] RBP: 00007f82c78ee040 R08: 0000000000000000 R09: 0000000002044034 [ 1020.179673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1020.181133] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:29:57 executing program 3: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1020.279538] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:29:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:29:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) 03:30:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1034.388271] FAULT_INJECTION: forcing a failure. [ 1034.388271] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.391061] CPU: 0 PID: 9288 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1034.392712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.394755] Call Trace: [ 1034.395405] dump_stack+0x107/0x167 [ 1034.396301] should_fail.cold+0x5/0xa [ 1034.397345] ? create_object.isra.0+0x3a/0xa20 [ 1034.398488] should_failslab+0x5/0x20 [ 1034.399426] kmem_cache_alloc+0x5b/0x310 [ 1034.400435] ? ksys_write+0x21a/0x260 [ 1034.401400] create_object.isra.0+0x3a/0xa20 [ 1034.402487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.403757] kmem_cache_alloc+0x159/0x310 [ 1034.404795] getname_flags.part.0+0x50/0x4f0 [ 1034.405908] getname_flags+0x9a/0xe0 [ 1034.406852] do_mkdirat+0x8f/0x2b0 [ 1034.407739] ? user_path_create+0xf0/0xf0 [ 1034.408647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.409760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.410807] do_syscall_64+0x33/0x40 [ 1034.411571] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1034.412604] RIP: 0033:0x7f82ca377c27 [ 1034.413368] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.417164] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1034.418710] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca377c27 [ 1034.420150] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1034.421616] RBP: 00007f82c78ee040 R08: 0000000000000000 R09: 0000000002044034 [ 1034.423063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1034.424500] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:30:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1034.459938] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:30:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:30:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1034.683324] FAULT_INJECTION: forcing a failure. [ 1034.683324] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1034.685808] CPU: 0 PID: 9310 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1034.687188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.688862] Call Trace: [ 1034.689410] dump_stack+0x107/0x167 [ 1034.690165] should_fail.cold+0x5/0xa [ 1034.690945] strncpy_from_user+0x34/0x470 [ 1034.691783] getname_flags.part.0+0x95/0x4f0 [ 1034.692666] getname_flags+0x9a/0xe0 [ 1034.693427] do_mkdirat+0x8f/0x2b0 [ 1034.694158] ? user_path_create+0xf0/0xf0 [ 1034.695007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.696071] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.697147] do_syscall_64+0x33/0x40 [ 1034.697920] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1034.698979] RIP: 0033:0x7f82ca377c27 [ 1034.699744] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.703508] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1034.705071] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca377c27 [ 1034.706508] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1034.707956] RBP: 00007f82c78ee040 R08: 0000000000000000 R09: 0000000002044034 [ 1034.709406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1034.710848] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1034.750639] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:30:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) 03:30:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1047.354083] FAULT_INJECTION: forcing a failure. [ 1047.354083] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.356771] CPU: 1 PID: 9323 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1047.358172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.359864] Call Trace: [ 1047.360407] dump_stack+0x107/0x167 [ 1047.361165] should_fail.cold+0x5/0xa [ 1047.362076] should_failslab+0x5/0x20 [ 1047.363063] __kmalloc_track_caller+0x79/0x370 [ 1047.364444] ? strndup_user+0x74/0xe0 [ 1047.365373] ? getname_flags.part.0+0x1dd/0x4f0 [ 1047.366334] memdup_user+0x22/0xd0 [ 1047.367064] strndup_user+0x74/0xe0 [ 1047.367813] __x64_sys_mount+0x133/0x300 [ 1047.368654] ? copy_mnt_ns+0xa00/0xa00 [ 1047.369561] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.370802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.371853] do_syscall_64+0x33/0x40 [ 1047.372623] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1047.373694] RIP: 0033:0x7f82ca37a04a [ 1047.374451] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1047.378171] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1047.379713] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1047.381176] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1047.382621] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1047.384048] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1047.385520] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:30:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) 03:30:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1047.677271] FAULT_INJECTION: forcing a failure. [ 1047.677271] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.678807] CPU: 0 PID: 9348 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1047.679699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.680766] Call Trace: [ 1047.681121] dump_stack+0x107/0x167 [ 1047.681616] should_fail.cold+0x5/0xa [ 1047.682145] ? create_object.isra.0+0x3a/0xa20 [ 1047.682764] should_failslab+0x5/0x20 [ 1047.683279] kmem_cache_alloc+0x5b/0x310 [ 1047.683836] create_object.isra.0+0x3a/0xa20 [ 1047.684411] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.685104] __kmalloc_track_caller+0x177/0x370 [ 1047.685713] ? strndup_user+0x74/0xe0 [ 1047.686211] ? getname_flags.part.0+0x1dd/0x4f0 [ 1047.686825] memdup_user+0x22/0xd0 [ 1047.687298] strndup_user+0x74/0xe0 [ 1047.687985] __x64_sys_mount+0x133/0x300 [ 1047.688528] ? copy_mnt_ns+0xa00/0xa00 [ 1047.689055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.689747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.690423] do_syscall_64+0x33/0x40 [ 1047.690920] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1047.691587] RIP: 0033:0x7f82ca37a04a [ 1047.692076] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1047.694498] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1047.695498] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1047.696417] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1047.697389] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1047.698299] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1047.699243] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1047.705891] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:30:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) 03:30:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1061.067268] FAULT_INJECTION: forcing a failure. [ 1061.067268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1061.069080] CPU: 1 PID: 9362 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1061.070122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.071395] Call Trace: [ 1061.071800] dump_stack+0x107/0x167 [ 1061.072363] should_fail.cold+0x5/0xa [ 1061.072937] _copy_from_user+0x2e/0x1b0 [ 1061.073556] memdup_user+0x65/0xd0 [ 1061.074103] strndup_user+0x74/0xe0 [ 1061.074662] __x64_sys_mount+0x133/0x300 [ 1061.075294] ? copy_mnt_ns+0xa00/0xa00 [ 1061.075904] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.076715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.077520] do_syscall_64+0x33/0x40 [ 1061.078090] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1061.078735] RIP: 0033:0x7f82ca37a04a [ 1061.079170] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.081354] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1061.082242] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1061.083088] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1061.083940] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1061.084784] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1061.085639] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:30:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:30:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1061.268139] FAULT_INJECTION: forcing a failure. [ 1061.268139] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.270694] CPU: 0 PID: 9375 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1061.272060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.273734] Call Trace: [ 1061.274358] dump_stack+0x107/0x167 [ 1061.275093] should_fail.cold+0x5/0xa [ 1061.275857] ? copy_mount_options+0x55/0x180 [ 1061.276743] should_failslab+0x5/0x20 [ 1061.277534] kmem_cache_alloc_trace+0x55/0x320 [ 1061.278440] ? _copy_from_user+0xfb/0x1b0 [ 1061.279282] copy_mount_options+0x55/0x180 [ 1061.280143] __x64_sys_mount+0x1a8/0x300 [ 1061.280957] ? copy_mnt_ns+0xa00/0xa00 [ 1061.281757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.282812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.283856] do_syscall_64+0x33/0x40 [ 1061.284610] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1061.285646] RIP: 0033:0x7f82ca37a04a [ 1061.286406] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.290095] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1061.291624] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1061.293060] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1061.294481] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1061.295917] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1061.297351] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:30:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) 03:30:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1075.819009] FAULT_INJECTION: forcing a failure. [ 1075.819009] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.821361] CPU: 0 PID: 9394 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1075.822762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1075.824452] Call Trace: [ 1075.824998] dump_stack+0x107/0x167 [ 1075.825780] should_fail.cold+0x5/0xa [ 1075.826587] ? create_object.isra.0+0x3a/0xa20 [ 1075.827544] should_failslab+0x5/0x20 [ 1075.828341] kmem_cache_alloc+0x5b/0x310 [ 1075.829182] create_object.isra.0+0x3a/0xa20 [ 1075.830082] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1075.831123] kmem_cache_alloc_trace+0x151/0x320 [ 1075.832077] copy_mount_options+0x55/0x180 [ 1075.832946] __x64_sys_mount+0x1a8/0x300 [ 1075.833784] ? copy_mnt_ns+0xa00/0xa00 [ 1075.834581] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1075.835659] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1075.836712] do_syscall_64+0x33/0x40 [ 1075.837491] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1075.838541] RIP: 0033:0x7f82ca37a04a [ 1075.839299] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.843082] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1075.844627] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1075.846110] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1075.847560] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1075.849013] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1075.850481] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:30:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1075.873954] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:30:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:30:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:30:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) [ 1076.166625] FAULT_INJECTION: forcing a failure. [ 1076.166625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1076.169306] CPU: 0 PID: 9413 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1076.170815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1076.172488] Call Trace: [ 1076.173030] dump_stack+0x107/0x167 [ 1076.173783] should_fail.cold+0x5/0xa [ 1076.174573] _copy_from_user+0x2e/0x1b0 [ 1076.175379] copy_mount_options+0x76/0x180 [ 1076.176233] __x64_sys_mount+0x1a8/0x300 [ 1076.177056] ? copy_mnt_ns+0xa00/0xa00 [ 1076.177864] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1076.178907] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1076.179940] do_syscall_64+0x33/0x40 [ 1076.180687] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1076.181718] RIP: 0033:0x7f82ca37a04a [ 1076.182462] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.186131] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1076.187646] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1076.189059] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1076.190491] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1076.191904] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1076.193317] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1076.245060] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) 03:31:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1089.541012] FAULT_INJECTION: forcing a failure. [ 1089.541012] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.542808] CPU: 1 PID: 9429 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1089.543968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1089.545456] Call Trace: [ 1089.545874] dump_stack+0x107/0x167 [ 1089.546435] should_fail.cold+0x5/0xa [ 1089.547018] ? getname_flags.part.0+0x50/0x4f0 [ 1089.547712] should_failslab+0x5/0x20 [ 1089.548305] kmem_cache_alloc+0x5b/0x310 [ 1089.548923] getname_flags.part.0+0x50/0x4f0 [ 1089.549594] user_path_at_empty+0xa1/0x100 [ 1089.550204] __x64_sys_mount+0x1e9/0x300 [ 1089.550693] ? copy_mnt_ns+0xa00/0xa00 [ 1089.551167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1089.551797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1089.552411] do_syscall_64+0x33/0x40 [ 1089.552859] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1089.553475] RIP: 0033:0x7f82ca37a04a [ 1089.553932] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.556055] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1089.556971] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1089.557812] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1089.558660] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1089.559504] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1089.560347] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:31:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) 03:31:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1089.795603] FAULT_INJECTION: forcing a failure. [ 1089.795603] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.796927] CPU: 1 PID: 9445 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1089.797716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1089.798646] Call Trace: [ 1089.798956] dump_stack+0x107/0x167 [ 1089.799373] should_fail.cold+0x5/0xa [ 1089.799810] ? create_object.isra.0+0x3a/0xa20 [ 1089.800327] should_failslab+0x5/0x20 [ 1089.800757] kmem_cache_alloc+0x5b/0x310 [ 1089.801217] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1089.801812] create_object.isra.0+0x3a/0xa20 [ 1089.802313] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1089.802899] kmem_cache_alloc+0x159/0x310 [ 1089.803375] getname_flags.part.0+0x50/0x4f0 [ 1089.803889] user_path_at_empty+0xa1/0x100 [ 1089.804375] __x64_sys_mount+0x1e9/0x300 [ 1089.804840] ? copy_mnt_ns+0xa00/0xa00 [ 1089.805275] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1089.805896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1089.806503] do_syscall_64+0x33/0x40 [ 1089.806935] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1089.807539] RIP: 0033:0x7f82ca37a04a [ 1089.807969] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.810126] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1089.811021] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1089.811838] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1089.812671] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1089.813506] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1089.814343] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:31:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:31:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1089.886426] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1090.092858] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:31:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) [ 1103.754251] FAULT_INJECTION: forcing a failure. [ 1103.754251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1103.756101] CPU: 1 PID: 9481 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1103.757121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1103.758347] Call Trace: [ 1103.758753] dump_stack+0x107/0x167 [ 1103.759313] should_fail.cold+0x5/0xa [ 1103.759906] strncpy_from_user+0x34/0x470 [ 1103.760547] getname_flags.part.0+0x95/0x4f0 [ 1103.761234] user_path_at_empty+0xa1/0x100 [ 1103.761888] __x64_sys_mount+0x1e9/0x300 [ 1103.762490] ? copy_mnt_ns+0xa00/0xa00 [ 1103.763017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1103.763611] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1103.764178] do_syscall_64+0x33/0x40 [ 1103.764606] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1103.765191] RIP: 0033:0x7f82ca37a04a [ 1103.765602] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.767708] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1103.768581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1103.769361] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1103.770135] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1103.770906] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1103.771667] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1103.791097] FAULT_INJECTION: forcing a failure. [ 1103.791097] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.792424] CPU: 1 PID: 9485 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1103.793241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1103.794250] Call Trace: [ 1103.794562] dump_stack+0x107/0x167 [ 1103.794999] should_fail.cold+0x5/0xa [ 1103.795454] ? getname_flags.part.0+0x50/0x4f0 [ 1103.795990] should_failslab+0x5/0x20 [ 1103.796445] kmem_cache_alloc+0x5b/0x310 [ 1103.796935] getname_flags.part.0+0x50/0x4f0 [ 1103.797464] getname_flags+0x9a/0xe0 [ 1103.797919] do_mkdirat+0x8f/0x2b0 [ 1103.798344] ? user_path_create+0xf0/0xf0 [ 1103.798847] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1103.799472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1103.800091] do_syscall_64+0x33/0x40 [ 1103.800545] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1103.801153] RIP: 0033:0x7efe557edc27 [ 1103.801599] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.803830] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1103.804749] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557edc27 [ 1103.805608] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1103.806475] RBP: 00007efe52d64040 R08: 0000000000000000 R09: 0000000002044034 [ 1103.807324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1103.808135] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:31:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1103.814323] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) 03:31:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1103.997029] FAULT_INJECTION: forcing a failure. [ 1103.997029] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.999518] CPU: 0 PID: 9495 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1104.000897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1104.002565] Call Trace: [ 1104.003095] dump_stack+0x107/0x167 [ 1104.003832] should_fail.cold+0x5/0xa [ 1104.004590] ? create_object.isra.0+0x3a/0xa20 [ 1104.005499] should_failslab+0x5/0x20 [ 1104.006263] kmem_cache_alloc+0x5b/0x310 [ 1104.007062] ? ksys_write+0x21a/0x260 [ 1104.007822] create_object.isra.0+0x3a/0xa20 [ 1104.008694] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1104.009737] kmem_cache_alloc+0x159/0x310 [ 1104.010589] getname_flags.part.0+0x50/0x4f0 [ 1104.011472] getname_flags+0x9a/0xe0 [ 1104.012219] do_mkdirat+0x8f/0x2b0 [ 1104.012935] ? user_path_create+0xf0/0xf0 [ 1104.013814] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1104.014892] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1104.015970] do_syscall_64+0x33/0x40 [ 1104.016726] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1104.017741] RIP: 0033:0x7efe557edc27 [ 1104.018502] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.022182] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1104.023696] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557edc27 [ 1104.025106] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1104.026539] RBP: 00007efe52d64040 R08: 0000000000000000 R09: 0000000002044034 [ 1104.027961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1104.029374] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1104.096202] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:31:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:31:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:31:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1117.443481] FAULT_INJECTION: forcing a failure. [ 1117.443481] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.446779] CPU: 1 PID: 9509 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1117.448431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1117.450472] Call Trace: [ 1117.451168] dump_stack+0x107/0x167 [ 1117.452083] should_fail.cold+0x5/0xa [ 1117.453031] ? alloc_fs_context+0x57/0x840 [ 1117.454137] should_failslab+0x5/0x20 [ 1117.455064] kmem_cache_alloc_trace+0x55/0x320 [ 1117.456046] ? cap_capable+0x1d6/0x240 [ 1117.456914] alloc_fs_context+0x57/0x840 [ 1117.457786] path_mount+0x931/0x20b0 [ 1117.458614] ? strncpy_from_user+0x9e/0x470 [ 1117.459551] ? finish_automount+0xa90/0xa90 [ 1117.460466] ? getname_flags.part.0+0x1dd/0x4f0 [ 1117.461515] __x64_sys_mount+0x282/0x300 [ 1117.462404] ? copy_mnt_ns+0xa00/0xa00 [ 1117.463260] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.464408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1117.465514] do_syscall_64+0x33/0x40 [ 1117.466370] entry_SYSCALL_64_after_hwframe+0x62/0xc7 03:31:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1117.467486] RIP: 0033:0x7f82ca37a04a [ 1117.468447] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1117.472045] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1117.472507] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1117.472539] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1117.477199] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1117.478800] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1117.480386] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1117.481978] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1117.515272] FAULT_INJECTION: forcing a failure. [ 1117.515272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1117.518630] CPU: 1 PID: 9512 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1117.520308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1117.522303] Call Trace: [ 1117.522846] dump_stack+0x107/0x167 [ 1117.523666] should_fail.cold+0x5/0xa [ 1117.524471] strncpy_from_user+0x34/0x470 [ 1117.525377] getname_flags.part.0+0x95/0x4f0 [ 1117.526467] getname_flags+0x9a/0xe0 [ 1117.527281] do_mkdirat+0x8f/0x2b0 [ 1117.528029] ? user_path_create+0xf0/0xf0 [ 1117.528965] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.530152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1117.531302] do_syscall_64+0x33/0x40 [ 1117.532159] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1117.533335] RIP: 0033:0x7efe557edc27 [ 1117.534131] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1117.538045] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1117.539701] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557edc27 [ 1117.541391] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1117.542960] RBP: 00007efe52d64040 R08: 0000000000000000 R09: 0000000002044034 [ 1117.544522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1117.546208] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:31:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) 03:31:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1117.646810] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1117.762260] FAULT_INJECTION: forcing a failure. [ 1117.762260] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.765112] CPU: 0 PID: 9520 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1117.766486] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1117.768117] Call Trace: [ 1117.768716] dump_stack+0x107/0x167 [ 1117.769482] should_fail.cold+0x5/0xa [ 1117.770258] ? getname_flags.part.0+0x50/0x4f0 [ 1117.771173] should_failslab+0x5/0x20 [ 1117.771943] kmem_cache_alloc+0x5b/0x310 [ 1117.772766] getname_flags.part.0+0x50/0x4f0 [ 1117.773664] getname_flags+0x9a/0xe0 [ 1117.774430] do_mkdirat+0x8f/0x2b0 [ 1117.775145] ? user_path_create+0xf0/0xf0 [ 1117.775986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.777053] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1117.778120] do_syscall_64+0x33/0x40 [ 1117.778872] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1117.779918] RIP: 0033:0x7f842a916c27 [ 1117.780670] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1117.784455] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1117.785951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a916c27 [ 1117.787389] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1117.788807] RBP: 00007f8427e8d040 R08: 0000000000000000 R09: 0000000002044034 [ 1117.790232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1117.791642] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1117.816874] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) 03:31:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:31:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) 03:31:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1132.207528] FAULT_INJECTION: forcing a failure. [ 1132.207528] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.209325] CPU: 1 PID: 9537 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1132.210406] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.211667] Call Trace: [ 1132.212082] dump_stack+0x107/0x167 [ 1132.212650] should_fail.cold+0x5/0xa [ 1132.213243] ? create_object.isra.0+0x3a/0xa20 [ 1132.213373] FAULT_INJECTION: forcing a failure. [ 1132.213373] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1132.213947] should_failslab+0x5/0x20 [ 1132.213963] kmem_cache_alloc+0x5b/0x310 [ 1132.213981] create_object.isra.0+0x3a/0xa20 [ 1132.214005] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.218920] kmem_cache_alloc_trace+0x151/0x320 [ 1132.219487] ? cap_capable+0x1d6/0x240 [ 1132.219966] alloc_fs_context+0x57/0x840 [ 1132.220465] path_mount+0x931/0x20b0 [ 1132.220925] ? strncpy_from_user+0x9e/0x470 [ 1132.221450] ? finish_automount+0xa90/0xa90 [ 1132.221980] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.222567] __x64_sys_mount+0x282/0x300 [ 1132.223063] ? copy_mnt_ns+0xa00/0xa00 [ 1132.223549] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.224169] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.224790] do_syscall_64+0x33/0x40 [ 1132.225240] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.225856] RIP: 0033:0x7f82ca37a04a [ 1132.226321] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.228525] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1132.229432] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1132.230281] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1132.231134] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1132.231950] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1132.232801] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1132.233689] CPU: 0 PID: 9536 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1132.235088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.236771] Call Trace: [ 1132.237306] dump_stack+0x107/0x167 [ 1132.238051] should_fail.cold+0x5/0xa [ 1132.238924] __alloc_pages_nodemask+0x182/0x600 [ 1132.239864] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1132.241087] ? kmem_cache_alloc+0x301/0x310 [ 1132.241961] alloc_pages_current+0x187/0x280 [ 1132.242860] allocate_slab+0x26f/0x380 [ 1132.243654] ___slab_alloc+0x470/0x700 [ 1132.244441] ? getname_flags.part.0+0x50/0x4f0 [ 1132.245366] ? ksys_write+0x21a/0x260 [ 1132.246153] ? getname_flags.part.0+0x50/0x4f0 [ 1132.247073] ? kmem_cache_alloc+0x301/0x310 [ 1132.247942] kmem_cache_alloc+0x301/0x310 [ 1132.248785] getname_flags.part.0+0x50/0x4f0 [ 1132.249672] getname_flags+0x9a/0xe0 [ 1132.250441] do_mkdirat+0x8f/0x2b0 [ 1132.251164] ? user_path_create+0xf0/0xf0 [ 1132.252017] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.253075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.254127] do_syscall_64+0x33/0x40 [ 1132.254884] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.255917] RIP: 0033:0x7f842a916c27 [ 1132.256666] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.260379] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1132.261932] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a916c27 [ 1132.263370] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1132.264716] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1132.264808] RBP: 00007f8427e8d040 R08: 0000000000000000 R09: 0000000002044034 [ 1132.264823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1132.268382] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 03:31:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1132.271510] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:31:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1132.296091] FAULT_INJECTION: forcing a failure. [ 1132.296091] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.298422] CPU: 0 PID: 9541 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1132.299821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.301512] Call Trace: [ 1132.302056] dump_stack+0x107/0x167 [ 1132.302802] should_fail.cold+0x5/0xa [ 1132.303613] should_failslab+0x5/0x20 [ 1132.304407] __kmalloc_track_caller+0x79/0x370 03:31:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) [ 1132.305356] ? strndup_user+0x74/0xe0 [ 1132.306274] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.307215] memdup_user+0x22/0xd0 [ 1132.307940] strndup_user+0x74/0xe0 [ 1132.308691] __x64_sys_mount+0x133/0x300 [ 1132.309516] ? copy_mnt_ns+0xa00/0xa00 [ 1132.310320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.311376] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.312422] do_syscall_64+0x33/0x40 [ 1132.313176] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.314229] RIP: 0033:0x7efe557f004a [ 1132.314983] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.318694] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1132.320228] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1132.321663] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1132.323101] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1132.324538] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1132.326038] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:31:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:31:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:31:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:31:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) [ 1132.590059] FAULT_INJECTION: forcing a failure. [ 1132.590059] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.592499] CPU: 0 PID: 9555 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1132.593887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.595600] Call Trace: [ 1132.596146] dump_stack+0x107/0x167 [ 1132.596905] should_fail.cold+0x5/0xa [ 1132.597685] ? create_object.isra.0+0x3a/0xa20 [ 1132.598633] should_failslab+0x5/0x20 [ 1132.599412] kmem_cache_alloc+0x5b/0x310 [ 1132.600247] create_object.isra.0+0x3a/0xa20 [ 1132.601139] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.602180] __kmalloc_track_caller+0x177/0x370 [ 1132.603122] ? strndup_user+0x74/0xe0 [ 1132.603896] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.604851] memdup_user+0x22/0xd0 [ 1132.605574] strndup_user+0x74/0xe0 [ 1132.606340] __x64_sys_mount+0x133/0x300 [ 1132.607165] ? copy_mnt_ns+0xa00/0xa00 [ 1132.607961] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.609022] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.610072] do_syscall_64+0x33/0x40 [ 1132.610832] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.611864] RIP: 0033:0x7efe557f004a [ 1132.612616] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.616349] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1132.617913] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1132.619366] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1132.620809] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1132.622256] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1132.623718] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:31:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1132.634191] FAULT_INJECTION: forcing a failure. [ 1132.634191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1132.636857] CPU: 0 PID: 9556 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1132.638251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.639941] Call Trace: [ 1132.640475] dump_stack+0x107/0x167 [ 1132.641220] should_fail.cold+0x5/0xa [ 1132.642001] strncpy_from_user+0x34/0x470 [ 1132.642860] getname_flags.part.0+0x95/0x4f0 [ 1132.643762] getname_flags+0x9a/0xe0 [ 1132.644525] do_mkdirat+0x8f/0x2b0 [ 1132.645258] ? user_path_create+0xf0/0xf0 [ 1132.646109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.647181] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.648241] do_syscall_64+0x33/0x40 [ 1132.649010] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.650058] RIP: 0033:0x7f842a916c27 [ 1132.650825] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.654606] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1132.656179] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a916c27 [ 1132.657646] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1132.659126] RBP: 00007f8427e8d040 R08: 0000000000000000 R09: 0000000002044034 [ 1132.660602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1132.662049] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1132.676146] FAULT_INJECTION: forcing a failure. [ 1132.676146] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.678552] CPU: 0 PID: 9557 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1132.679945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.681739] Call Trace: [ 1132.682304] dump_stack+0x107/0x167 [ 1132.683065] should_fail.cold+0x5/0xa [ 1132.683857] ? legacy_init_fs_context+0x44/0xe0 [ 1132.684829] should_failslab+0x5/0x20 [ 1132.685617] kmem_cache_alloc_trace+0x55/0x320 [ 1132.686556] ? lockdep_init_map_type+0x2c7/0x780 [ 1132.687527] legacy_init_fs_context+0x44/0xe0 [ 1132.688442] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1132.689451] alloc_fs_context+0x4fd/0x840 [ 1132.690303] path_mount+0x931/0x20b0 [ 1132.691056] ? strncpy_from_user+0x9e/0x470 [ 1132.691943] ? finish_automount+0xa90/0xa90 [ 1132.692827] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.693808] __x64_sys_mount+0x282/0x300 [ 1132.694648] ? copy_mnt_ns+0xa00/0xa00 [ 1132.695442] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.696514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.697570] do_syscall_64+0x33/0x40 [ 1132.698334] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1132.699381] RIP: 0033:0x7f82ca37a04a [ 1132.700136] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.703894] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1132.705427] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1132.706888] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1132.708331] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1132.709765] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1132.711214] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1132.727734] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1132.736996] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) 03:32:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) 03:32:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) [ 1148.221289] FAULT_INJECTION: forcing a failure. [ 1148.221289] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.223759] CPU: 1 PID: 9577 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1148.225129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.226828] Call Trace: [ 1148.227370] dump_stack+0x107/0x167 [ 1148.228120] should_fail.cold+0x5/0xa [ 1148.228903] ? create_object.isra.0+0x3a/0xa20 [ 1148.229842] should_failslab+0x5/0x20 [ 1148.230652] kmem_cache_alloc+0x5b/0x310 [ 1148.231478] create_object.isra.0+0x3a/0xa20 [ 1148.232366] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1148.233396] kmem_cache_alloc_trace+0x151/0x320 [ 1148.234335] ? lockdep_init_map_type+0x2c7/0x780 [ 1148.235309] legacy_init_fs_context+0x44/0xe0 [ 1148.236216] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1148.237215] alloc_fs_context+0x4fd/0x840 [ 1148.238071] path_mount+0x931/0x20b0 [ 1148.238842] ? strncpy_from_user+0x9e/0x470 [ 1148.239723] ? finish_automount+0xa90/0xa90 [ 1148.240611] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.241566] __x64_sys_mount+0x282/0x300 03:32:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1148.242421] ? copy_mnt_ns+0xa00/0xa00 [ 1148.243363] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.244517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.245639] do_syscall_64+0x33/0x40 03:32:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1148.246538] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.247661] RIP: 0033:0x7f82ca37a04a [ 1148.248417] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.252139] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.253665] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1148.255110] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.256538] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1148.257961] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.259415] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1148.273429] FAULT_INJECTION: forcing a failure. [ 1148.273429] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.275941] CPU: 1 PID: 9579 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1148.276833] FAULT_INJECTION: forcing a failure. [ 1148.276833] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1148.277327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.277333] Call Trace: [ 1148.277358] dump_stack+0x107/0x167 [ 1148.282641] should_fail.cold+0x5/0xa [ 1148.283416] should_failslab+0x5/0x20 [ 1148.284187] __kmalloc_track_caller+0x79/0x370 [ 1148.285111] ? strndup_user+0x74/0xe0 [ 1148.285876] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.286839] memdup_user+0x22/0xd0 [ 1148.287560] strndup_user+0x74/0xe0 [ 1148.288295] __x64_sys_mount+0x133/0x300 [ 1148.289120] ? copy_mnt_ns+0xa00/0xa00 [ 1148.289907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.290964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.292018] do_syscall_64+0x33/0x40 [ 1148.292771] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.293804] RIP: 0033:0x7f842a91904a [ 1148.294563] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.298265] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.299837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1148.301264] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.302705] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1148.304131] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.305584] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1148.307119] CPU: 0 PID: 9581 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1148.308506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.310175] Call Trace: [ 1148.310726] dump_stack+0x107/0x167 [ 1148.311464] should_fail.cold+0x5/0xa [ 1148.312239] _copy_from_user+0x2e/0x1b0 [ 1148.313053] memdup_user+0x65/0xd0 [ 1148.313768] strndup_user+0x74/0xe0 [ 1148.314513] __x64_sys_mount+0x133/0x300 [ 1148.315339] ? copy_mnt_ns+0xa00/0xa00 [ 1148.316124] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.317174] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.318214] do_syscall_64+0x33/0x40 [ 1148.318976] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.320007] RIP: 0033:0x7efe557f004a [ 1148.320752] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.324453] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.325979] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1148.327427] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.328862] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1148.330292] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.331729] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:32:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:32:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1148.364032] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) 03:32:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:32:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) [ 1148.534596] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:32:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1148.625096] FAULT_INJECTION: forcing a failure. [ 1148.625096] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.627757] CPU: 1 PID: 9596 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1148.629280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.630981] Call Trace: [ 1148.631527] dump_stack+0x107/0x167 [ 1148.632298] should_fail.cold+0x5/0xa [ 1148.633100] ? copy_mount_options+0x55/0x180 [ 1148.634067] ? copy_mount_options+0x55/0x180 [ 1148.635010] should_failslab+0x5/0x20 [ 1148.635801] kmem_cache_alloc_trace+0x55/0x320 [ 1148.636740] ? _copy_from_user+0xfb/0x1b0 [ 1148.637598] copy_mount_options+0x55/0x180 [ 1148.638479] __x64_sys_mount+0x1a8/0x300 [ 1148.639314] ? copy_mnt_ns+0xa00/0xa00 [ 1148.640121] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.641186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.642257] do_syscall_64+0x33/0x40 [ 1148.643070] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.644109] RIP: 0033:0x7efe557f004a [ 1148.644864] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.648582] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.650119] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1148.651575] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.653024] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1148.654477] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.655926] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1148.667367] FAULT_INJECTION: forcing a failure. [ 1148.667367] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.669725] CPU: 1 PID: 9597 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1148.671142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.672810] Call Trace: [ 1148.673356] dump_stack+0x107/0x167 [ 1148.674115] should_fail.cold+0x5/0xa [ 1148.674912] ? legacy_init_fs_context+0x44/0xe0 [ 1148.675877] should_failslab+0x5/0x20 [ 1148.676649] kmem_cache_alloc_trace+0x55/0x320 [ 1148.677573] ? lockdep_init_map_type+0x2c7/0x780 [ 1148.678557] legacy_init_fs_context+0x44/0xe0 [ 1148.679462] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1148.680468] alloc_fs_context+0x4fd/0x840 [ 1148.681328] path_mount+0x931/0x20b0 [ 1148.682105] ? strncpy_from_user+0x9e/0x470 [ 1148.683007] ? finish_automount+0xa90/0xa90 [ 1148.683894] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.684859] __x64_sys_mount+0x282/0x300 [ 1148.685698] ? copy_mnt_ns+0xa00/0xa00 [ 1148.686516] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.687590] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.688653] do_syscall_64+0x33/0x40 [ 1148.689417] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.690474] RIP: 0033:0x7f82ca37a04a [ 1148.691244] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.695208] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.696985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1148.698518] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.700091] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1148.701657] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.703135] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1148.732621] FAULT_INJECTION: forcing a failure. [ 1148.732621] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.735360] CPU: 1 PID: 9598 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1148.736740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1148.738526] Call Trace: [ 1148.739058] dump_stack+0x107/0x167 [ 1148.739799] should_fail.cold+0x5/0xa [ 1148.740643] ? create_object.isra.0+0x3a/0xa20 [ 1148.741596] should_failslab+0x5/0x20 [ 1148.742373] kmem_cache_alloc+0x5b/0x310 [ 1148.743222] create_object.isra.0+0x3a/0xa20 [ 1148.744231] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1148.745302] __kmalloc_track_caller+0x177/0x370 [ 1148.746251] ? strndup_user+0x74/0xe0 [ 1148.747035] ? getname_flags.part.0+0x1dd/0x4f0 [ 1148.748123] memdup_user+0x22/0xd0 [ 1148.748864] strndup_user+0x74/0xe0 [ 1148.749617] __x64_sys_mount+0x133/0x300 [ 1148.750607] ? copy_mnt_ns+0xa00/0xa00 [ 1148.751408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1148.752468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1148.753516] do_syscall_64+0x33/0x40 [ 1148.754274] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1148.755333] RIP: 0033:0x7f842a91904a [ 1148.756090] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1148.760060] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1148.761749] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1148.763229] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1148.764783] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1148.766247] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1148.767729] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1148.797001] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1148.872631] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) 03:32:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) 03:32:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:32:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) 03:32:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) 03:32:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) [ 1163.433170] FAULT_INJECTION: forcing a failure. [ 1163.433170] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.433796] FAULT_INJECTION: forcing a failure. [ 1163.433796] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.434970] CPU: 1 PID: 9617 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1163.438249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.439533] Call Trace: [ 1163.439934] dump_stack+0x107/0x167 [ 1163.440499] should_fail.cold+0x5/0xa [ 1163.441074] ? create_object.isra.0+0x3a/0xa20 [ 1163.441773] should_failslab+0x5/0x20 [ 1163.442354] kmem_cache_alloc+0x5b/0x310 [ 1163.442998] create_object.isra.0+0x3a/0xa20 [ 1163.443604] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.444205] kmem_cache_alloc_trace+0x151/0x320 [ 1163.444755] ? _copy_from_user+0xfb/0x1b0 [ 1163.445204] copy_mount_options+0x55/0x180 [ 1163.445714] __x64_sys_mount+0x1a8/0x300 [ 1163.446194] ? copy_mnt_ns+0xa00/0xa00 [ 1163.446677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.447300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.447920] do_syscall_64+0x33/0x40 [ 1163.448369] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.448975] RIP: 0033:0x7efe557f004a [ 1163.449423] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.451637] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.452543] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1163.453301] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.454156] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1163.455023] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.455777] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1163.456650] CPU: 0 PID: 9616 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1163.458049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.459774] Call Trace: [ 1163.460327] dump_stack+0x107/0x167 [ 1163.461085] should_fail.cold+0x5/0xa [ 1163.461881] ? getname_flags.part.0+0x50/0x4f0 [ 1163.462837] should_failslab+0x5/0x20 [ 1163.463627] kmem_cache_alloc+0x5b/0x310 [ 1163.464475] getname_flags.part.0+0x50/0x4f0 [ 1163.465347] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1163.465386] getname_flags+0x9a/0xe0 [ 1163.466855] do_mkdirat+0x8f/0x2b0 [ 1163.467592] ? user_path_create+0xf0/0xf0 [ 1163.468451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.469533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.470628] do_syscall_64+0x33/0x40 [ 1163.471395] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.472453] RIP: 0033:0x7f101d109c27 [ 1163.473222] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.477013] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1163.478563] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d109c27 [ 1163.480005] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1163.481438] RBP: 00007f101a680040 R08: 0000000000000000 R09: 0000000002044034 [ 1163.482888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1163.484328] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:32:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) [ 1163.487308] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1163.527217] FAULT_INJECTION: forcing a failure. [ 1163.527217] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.529619] CPU: 0 PID: 9620 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1163.531076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.532782] Call Trace: [ 1163.533329] dump_stack+0x107/0x167 03:32:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1163.534108] should_fail.cold+0x5/0xa [ 1163.535000] ? create_object.isra.0+0x3a/0xa20 [ 1163.535951] should_failslab+0x5/0x20 [ 1163.536732] kmem_cache_alloc+0x5b/0x310 [ 1163.537561] create_object.isra.0+0x3a/0xa20 [ 1163.538458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.539514] __kmalloc_track_caller+0x177/0x370 [ 1163.540456] ? ext4_remount+0xdf/0x26e0 [ 1163.541270] kstrdup+0x36/0x70 [ 1163.541929] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.542948] ext4_remount+0xdf/0x26e0 [ 1163.543731] ? shrink_dentry_list+0x28d/0x500 03:32:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@journal_ioprio}]}) [ 1163.544642] ? lock_downgrade+0x6d0/0x6d0 [ 1163.545528] ? lock_downgrade+0x6d0/0x6d0 [ 1163.546373] ? do_raw_spin_lock+0x121/0x260 [ 1163.547282] ? rwlock_bug.part.0+0x90/0x90 [ 1163.547735] FAULT_INJECTION: forcing a failure. [ 1163.547735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1163.548145] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.548170] ? do_raw_spin_unlock+0x4f/0x220 [ 1163.551876] ? _raw_spin_unlock+0x1a/0x30 [ 1163.552730] ? shrink_dentry_list+0x134/0x500 [ 1163.553642] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1163.554711] ? shrink_dcache_sb+0x1d5/0x220 [ 1163.555593] ? shrink_dentry_list+0x500/0x500 [ 1163.556521] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.557537] legacy_reconfigure+0x11b/0x190 [ 1163.558418] reconfigure_super+0x414/0x9c0 [ 1163.559306] ? fs_umode_to_dtype+0xb0/0xb0 [ 1163.560167] path_mount+0x1a75/0x20b0 [ 1163.560947] ? strncpy_from_user+0x9e/0x470 [ 1163.561827] ? finish_automount+0xa90/0xa90 [ 1163.562711] ? getname_flags.part.0+0x1dd/0x4f0 [ 1163.563671] __x64_sys_mount+0x282/0x300 [ 1163.564495] ? copy_mnt_ns+0xa00/0xa00 [ 1163.565289] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.566342] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.567397] do_syscall_64+0x33/0x40 [ 1163.568158] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.569202] RIP: 0033:0x7f82ca37a04a [ 1163.569959] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.573683] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.575225] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1163.576663] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.578101] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1163.579554] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.581004] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1163.582467] CPU: 1 PID: 9622 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1163.583294] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.584278] Call Trace: [ 1163.584437] FAULT_INJECTION: forcing a failure. [ 1163.584437] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.584574] dump_stack+0x107/0x167 [ 1163.587229] should_fail.cold+0x5/0xa [ 1163.587642] _copy_from_user+0x2e/0x1b0 [ 1163.588100] memdup_user+0x65/0xd0 [ 1163.588486] strndup_user+0x74/0xe0 [ 1163.588906] __x64_sys_mount+0x133/0x300 [ 1163.589337] ? copy_mnt_ns+0xa00/0xa00 [ 1163.589785] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.590345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.590937] do_syscall_64+0x33/0x40 [ 1163.591366] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.591943] RIP: 0033:0x7f842a91904a [ 1163.592345] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.594404] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.595260] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1163.596064] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.596857] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1163.597658] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.598455] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1163.599298] CPU: 0 PID: 9621 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1163.600738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.602411] Call Trace: [ 1163.602974] dump_stack+0x107/0x167 [ 1163.603730] should_fail.cold+0x5/0xa [ 1163.604509] ? getname_flags.part.0+0x50/0x4f0 [ 1163.605444] should_failslab+0x5/0x20 [ 1163.606218] kmem_cache_alloc+0x5b/0x310 [ 1163.607070] getname_flags.part.0+0x50/0x4f0 [ 1163.607970] getname_flags+0x9a/0xe0 [ 1163.608731] do_mkdirat+0x8f/0x2b0 [ 1163.609465] ? user_path_create+0xf0/0xf0 [ 1163.610307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.611384] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.612434] do_syscall_64+0x33/0x40 [ 1163.613192] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.614227] RIP: 0033:0x7ff726146c27 [ 1163.615003] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.618816] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1163.620356] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff726146c27 [ 1163.621804] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1163.623266] RBP: 00007ff7236bd040 R08: 0000000000000000 R09: 0000000002044034 [ 1163.624712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1163.626157] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:32:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) [ 1163.639692] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) [ 1163.641540] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) 03:32:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) [ 1163.823216] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1163.833956] FAULT_INJECTION: forcing a failure. [ 1163.833956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1163.835619] CPU: 1 PID: 9632 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1163.836358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.837259] Call Trace: [ 1163.837543] dump_stack+0x107/0x167 [ 1163.837949] should_fail.cold+0x5/0xa [ 1163.838376] _copy_from_user+0x2e/0x1b0 [ 1163.838840] copy_mount_options+0x76/0x180 [ 1163.839316] __x64_sys_mount+0x1a8/0x300 [ 1163.839766] ? copy_mnt_ns+0xa00/0xa00 [ 1163.840185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.840747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.841369] do_syscall_64+0x33/0x40 [ 1163.841843] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.842396] RIP: 0033:0x7efe557f004a [ 1163.842813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.844834] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.845675] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1163.846536] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.847589] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1163.848378] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.849167] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1163.854770] FAULT_INJECTION: forcing a failure. [ 1163.854770] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.856089] CPU: 1 PID: 9636 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1163.856846] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.857767] Call Trace: [ 1163.858050] dump_stack+0x107/0x167 [ 1163.858473] should_fail.cold+0x5/0xa [ 1163.858920] ? create_object.isra.0+0x3a/0xa20 [ 1163.859433] should_failslab+0x5/0x20 [ 1163.859854] kmem_cache_alloc+0x5b/0x310 [ 1163.860304] ? ksys_write+0x21a/0x260 [ 1163.860725] create_object.isra.0+0x3a/0xa20 [ 1163.861210] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.861776] kmem_cache_alloc+0x159/0x310 [ 1163.862235] getname_flags.part.0+0x50/0x4f0 [ 1163.862712] getname_flags+0x9a/0xe0 [ 1163.863123] do_mkdirat+0x8f/0x2b0 [ 1163.863528] ? user_path_create+0xf0/0xf0 [ 1163.863986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.864565] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.865141] do_syscall_64+0x33/0x40 [ 1163.865558] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.866138] RIP: 0033:0x7f101d109c27 [ 1163.866565] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.868587] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1163.869430] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d109c27 [ 1163.870172] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1163.870957] RBP: 00007f101a680040 R08: 0000000000000000 R09: 0000000002044034 [ 1163.871744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1163.872531] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:32:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1163.892635] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1163.898438] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1163.898966] FAULT_INJECTION: forcing a failure. [ 1163.898966] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.901419] CPU: 0 PID: 9638 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1163.902842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.904543] Call Trace: [ 1163.905101] dump_stack+0x107/0x167 [ 1163.905878] should_fail.cold+0x5/0xa [ 1163.906698] ? copy_mount_options+0x55/0x180 [ 1163.907621] should_failslab+0x5/0x20 [ 1163.908469] kmem_cache_alloc_trace+0x55/0x320 [ 1163.909423] ? _copy_from_user+0xfb/0x1b0 [ 1163.910276] copy_mount_options+0x55/0x180 [ 1163.911160] __x64_sys_mount+0x1a8/0x300 [ 1163.912037] ? copy_mnt_ns+0xa00/0xa00 [ 1163.912843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.913903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.915057] do_syscall_64+0x33/0x40 [ 1163.915814] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.916842] RIP: 0033:0x7f842a91904a [ 1163.917600] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.921343] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.922871] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1163.924294] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.925717] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1163.927161] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.928599] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1163.958241] FAULT_INJECTION: forcing a failure. [ 1163.958241] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.959450] CPU: 1 PID: 9639 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1163.960145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.960988] Call Trace: [ 1163.961262] dump_stack+0x107/0x167 [ 1163.961636] should_fail.cold+0x5/0xa [ 1163.962040] ? create_object.isra.0+0x3a/0xa20 [ 1163.962517] should_failslab+0x5/0x20 [ 1163.962917] kmem_cache_alloc+0x5b/0x310 [ 1163.963338] create_object.isra.0+0x3a/0xa20 [ 1163.963793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.964317] __kmalloc_track_caller+0x177/0x370 [ 1163.964814] ? ext4_remount+0xdf/0x26e0 [ 1163.965251] kstrdup+0x36/0x70 [ 1163.965589] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.966105] ext4_remount+0xdf/0x26e0 [ 1163.966514] ? shrink_dentry_list+0x28d/0x500 [ 1163.966992] ? lock_downgrade+0x6d0/0x6d0 [ 1163.967417] ? lock_downgrade+0x6d0/0x6d0 [ 1163.967851] ? do_raw_spin_lock+0x121/0x260 [ 1163.968305] ? rwlock_bug.part.0+0x90/0x90 [ 1163.968751] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.969261] ? do_raw_spin_unlock+0x4f/0x220 [ 1163.969723] ? _raw_spin_unlock+0x1a/0x30 [ 1163.970158] ? shrink_dentry_list+0x134/0x500 [ 1163.970742] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1163.971283] ? shrink_dcache_sb+0x1d5/0x220 [ 1163.971862] ? shrink_dentry_list+0x500/0x500 [ 1163.972388] ? ext4_register_li_request+0x8e0/0x8e0 [ 1163.972907] legacy_reconfigure+0x11b/0x190 [ 1163.973359] reconfigure_super+0x414/0x9c0 [ 1163.973819] ? fs_umode_to_dtype+0xb0/0xb0 [ 1163.974349] path_mount+0x1a75/0x20b0 [ 1163.974765] ? strncpy_from_user+0x9e/0x470 [ 1163.975210] ? finish_automount+0xa90/0xa90 [ 1163.975659] ? getname_flags.part.0+0x1dd/0x4f0 [ 1163.976145] __x64_sys_mount+0x282/0x300 [ 1163.976569] ? copy_mnt_ns+0xa00/0xa00 [ 1163.976974] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1163.977524] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1163.978066] do_syscall_64+0x33/0x40 [ 1163.978469] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1163.979014] RIP: 0033:0x7f82ca37a04a [ 1163.979397] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1163.980779] FAULT_INJECTION: forcing a failure. [ 1163.980779] name failslab, interval 1, probability 0, space 0, times 0 [ 1163.981290] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1163.981302] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1163.981308] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1163.981323] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1163.986618] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1163.987356] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1163.988113] CPU: 0 PID: 9640 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1163.989493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1163.991169] Call Trace: [ 1163.991700] dump_stack+0x107/0x167 [ 1163.992441] should_fail.cold+0x5/0xa [ 1163.993208] ? create_object.isra.0+0x3a/0xa20 [ 1163.994128] should_failslab+0x5/0x20 [ 1163.994914] kmem_cache_alloc+0x5b/0x310 [ 1163.995736] ? ksys_write+0x21a/0x260 [ 1163.996509] create_object.isra.0+0x3a/0xa20 [ 1163.997399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1163.998425] kmem_cache_alloc+0x159/0x310 [ 1163.999276] getname_flags.part.0+0x50/0x4f0 [ 1164.000166] getname_flags+0x9a/0xe0 [ 1164.000917] do_mkdirat+0x8f/0x2b0 [ 1164.001636] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1164.002748] ? user_path_create+0xf0/0xf0 [ 1164.003591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1164.004646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1164.005693] do_syscall_64+0x33/0x40 [ 1164.006444] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1164.006710] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1164.007482] RIP: 0033:0x7ff726146c27 [ 1164.008833] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1164.012533] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1164.014059] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff726146c27 [ 1164.015504] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1164.016928] RBP: 00007ff7236bd040 R08: 0000000000000000 R09: 0000000002044034 [ 1164.018360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1164.019799] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1164.033303] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:32:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) 03:32:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:32:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) 03:32:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) 03:32:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) [ 1178.021378] FAULT_INJECTION: forcing a failure. [ 1178.021378] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.023770] CPU: 1 PID: 9653 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1178.025140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.026802] Call Trace: [ 1178.027339] dump_stack+0x107/0x167 [ 1178.028074] should_fail.cold+0x5/0xa [ 1178.028840] ? create_object.isra.0+0x3a/0xa20 [ 1178.029755] should_failslab+0x5/0x20 [ 1178.030545] kmem_cache_alloc+0x5b/0x310 [ 1178.031403] create_object.isra.0+0x3a/0xa20 [ 1178.032300] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.033323] kmem_cache_alloc_trace+0x151/0x320 [ 1178.034269] ? _copy_from_user+0xfb/0x1b0 [ 1178.035125] copy_mount_options+0x55/0x180 [ 1178.035991] __x64_sys_mount+0x1a8/0x300 [ 1178.036809] ? copy_mnt_ns+0xa00/0xa00 [ 1178.037606] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.038795] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.040016] do_syscall_64+0x33/0x40 [ 1178.040827] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.041855] RIP: 0033:0x7f842a91904a [ 1178.042610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.044388] FAULT_INJECTION: forcing a failure. [ 1178.044388] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.046315] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.046336] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1178.046346] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.046357] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1178.046367] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.046377] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1178.055940] CPU: 0 PID: 9655 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1178.056767] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.057784] Call Trace: [ 1178.058115] dump_stack+0x107/0x167 [ 1178.058594] should_fail.cold+0x5/0xa [ 1178.059078] ? getname_flags.part.0+0x50/0x4f0 [ 1178.059649] should_failslab+0x5/0x20 [ 1178.060116] kmem_cache_alloc+0x5b/0x310 [ 1178.060632] getname_flags.part.0+0x50/0x4f0 [ 1178.061174] user_path_at_empty+0xa1/0x100 [ 1178.061710] __x64_sys_mount+0x1e9/0x300 [ 1178.062214] ? copy_mnt_ns+0xa00/0xa00 [ 1178.062702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.063355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.064012] do_syscall_64+0x33/0x40 [ 1178.064478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.065102] RIP: 0033:0x7efe557f004a [ 1178.065560] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.067833] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.068759] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1178.069629] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.070511] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1178.071376] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.072243] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1178.074340] FAULT_INJECTION: forcing a failure. [ 1178.074340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.075871] CPU: 0 PID: 9654 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1178.075999] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.076694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.076697] Call Trace: [ 1178.076708] dump_stack+0x107/0x167 [ 1178.076722] should_fail.cold+0x5/0xa [ 1178.076738] strncpy_from_user+0x34/0x470 [ 1178.076759] getname_flags.part.0+0x95/0x4f0 [ 1178.076784] getname_flags+0x9a/0xe0 [ 1178.076810] do_mkdirat+0x8f/0x2b0 [ 1178.082259] ? user_path_create+0xf0/0xf0 [ 1178.082786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.083411] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.084043] do_syscall_64+0x33/0x40 [ 1178.084490] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.085123] RIP: 0033:0x7ff726146c27 [ 1178.085578] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.087831] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1178.088741] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff726146c27 [ 1178.089600] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1178.090447] RBP: 00007ff7236bd040 R08: 0000000000000000 R09: 0000000002044034 [ 1178.091304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1178.092159] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1178.094323] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.104964] FAULT_INJECTION: forcing a failure. [ 1178.104964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.107534] CPU: 1 PID: 9659 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1178.108917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.110880] Call Trace: [ 1178.111503] dump_stack+0x107/0x167 [ 1178.112335] should_fail.cold+0x5/0xa [ 1178.113298] strncpy_from_user+0x34/0x470 [ 1178.114236] getname_flags.part.0+0x95/0x4f0 [ 1178.115302] getname_flags+0x9a/0xe0 [ 1178.116107] do_mkdirat+0x8f/0x2b0 [ 1178.116893] ? user_path_create+0xf0/0xf0 [ 1178.117750] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.118967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.120130] do_syscall_64+0x33/0x40 [ 1178.121065] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.122207] RIP: 0033:0x7f101d109c27 [ 1178.123095] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.127235] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1178.129005] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d109c27 [ 1178.130461] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1178.131926] RBP: 00007f101a680040 R08: 0000000000000000 R09: 0000000002044034 [ 1178.133383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1178.134856] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1178.137309] FAULT_INJECTION: forcing a failure. [ 1178.137309] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.139730] CPU: 1 PID: 9660 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1178.141276] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.143209] Call Trace: [ 1178.143835] dump_stack+0x107/0x167 [ 1178.144751] should_fail.cold+0x5/0xa [ 1178.145610] ? create_object.isra.0+0x3a/0xa20 [ 1178.146697] should_failslab+0x5/0x20 [ 1178.147556] kmem_cache_alloc+0x5b/0x310 [ 1178.148579] ? mark_held_locks+0x9e/0xe0 [ 1178.149460] create_object.isra.0+0x3a/0xa20 [ 1178.150438] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.151640] __kmalloc_track_caller+0x177/0x370 [ 1178.152717] ? ext4_remount+0x39c/0x26e0 [ 1178.153651] kstrdup+0x36/0x70 [ 1178.154393] ext4_remount+0x39c/0x26e0 [ 1178.155271] ? ext4_register_li_request+0x8e0/0x8e0 [ 1178.156472] ? do_raw_spin_unlock+0x4f/0x220 [ 1178.157488] ? _raw_spin_unlock+0x1a/0x30 [ 1178.158472] ? shrink_dentry_list+0x134/0x500 [ 1178.159423] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1178.160722] ? shrink_dentry_list+0x500/0x500 [ 1178.161718] ? ext4_register_li_request+0x8e0/0x8e0 [ 1178.163013] legacy_reconfigure+0x11b/0x190 [ 1178.163889] reconfigure_super+0x414/0x9c0 [ 1178.164889] ? fs_umode_to_dtype+0xb0/0xb0 [ 1178.165860] path_mount+0x1a75/0x20b0 [ 1178.166631] ? strncpy_from_user+0x9e/0x470 [ 1178.167527] ? finish_automount+0xa90/0xa90 [ 1178.168395] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.169358] __x64_sys_mount+0x282/0x300 [ 1178.170176] ? copy_mnt_ns+0xa00/0xa00 [ 1178.170993] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.172062] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.173123] do_syscall_64+0x33/0x40 [ 1178.173888] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.174933] RIP: 0033:0x7f82ca37a04a [ 1178.175699] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:32:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) [ 1178.179454] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.181143] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1178.182573] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.184020] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1178.185457] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.186914] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1178.189079] FAULT_INJECTION: forcing a failure. [ 1178.189079] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.191389] CPU: 1 PID: 9657 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1178.192776] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.194465] Call Trace: [ 1178.195013] dump_stack+0x107/0x167 [ 1178.195763] should_fail.cold+0x5/0xa [ 1178.196555] ? getname_flags.part.0+0x50/0x4f0 [ 1178.197629] should_failslab+0x5/0x20 [ 1178.198412] kmem_cache_alloc+0x5b/0x310 [ 1178.199276] getname_flags.part.0+0x50/0x4f0 [ 1178.200358] getname_flags+0x9a/0xe0 [ 1178.201245] do_mkdirat+0x8f/0x2b0 [ 1178.202066] ? user_path_create+0xf0/0xf0 [ 1178.203077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.204256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.205320] do_syscall_64+0x33/0x40 [ 1178.206113] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.207305] RIP: 0033:0x7fd4a1174c27 03:32:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) [ 1178.208237] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.212450] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1178.214231] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a1174c27 [ 1178.215917] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1178.217849] RBP: 00007fd49e6eb040 R08: 0000000000000000 R09: 0000000002044034 [ 1178.219559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1178.221261] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 03:32:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) [ 1178.262143] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.263882] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.265508] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) [ 1178.281139] FAULT_INJECTION: forcing a failure. [ 1178.281139] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.283608] CPU: 1 PID: 9662 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1178.285156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.286822] Call Trace: [ 1178.287351] dump_stack+0x107/0x167 [ 1178.288082] should_fail.cold+0x5/0xa [ 1178.288850] _copy_from_user+0x2e/0x1b0 [ 1178.289659] copy_mount_options+0x76/0x180 [ 1178.290614] __x64_sys_mount+0x1a8/0x300 [ 1178.291529] ? copy_mnt_ns+0xa00/0xa00 [ 1178.292682] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.293984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.295232] do_syscall_64+0x33/0x40 [ 1178.296311] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.297624] RIP: 0033:0x7f842a91904a [ 1178.298512] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.303221] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.305075] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1178.307060] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.308760] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1178.310455] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.312246] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 03:32:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) 03:32:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) [ 1178.371729] FAULT_INJECTION: forcing a failure. [ 1178.371729] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.374025] CPU: 1 PID: 9664 Comm: syz-executor.6 Not tainted 5.10.202 #1 03:32:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) [ 1178.375455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.377278] Call Trace: [ 1178.377815] dump_stack+0x107/0x167 [ 1178.378558] should_fail.cold+0x5/0xa [ 1178.379219] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.379350] ? create_object.isra.0+0x3a/0xa20 [ 1178.381450] should_failslab+0x5/0x20 [ 1178.382230] kmem_cache_alloc+0x5b/0x310 [ 1178.383057] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.384127] create_object.isra.0+0x3a/0xa20 [ 1178.385016] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.386055] kmem_cache_alloc+0x159/0x310 [ 1178.386910] getname_flags.part.0+0x50/0x4f0 [ 1178.387821] user_path_at_empty+0xa1/0x100 [ 1178.388670] __x64_sys_mount+0x1e9/0x300 [ 1178.389497] ? copy_mnt_ns+0xa00/0xa00 [ 1178.390277] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.391355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.392412] do_syscall_64+0x33/0x40 [ 1178.393174] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.394224] RIP: 0033:0x7efe557f004a [ 1178.395002] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.398746] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.400314] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1178.401767] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.403208] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1178.404656] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.406081] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1178.507331] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1178.578416] FAULT_INJECTION: forcing a failure. [ 1178.578416] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.580854] CPU: 0 PID: 9674 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1178.582241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.583952] Call Trace: [ 1178.584492] dump_stack+0x107/0x167 [ 1178.585238] should_fail.cold+0x5/0xa [ 1178.586013] should_failslab+0x5/0x20 [ 1178.586818] __kmalloc_track_caller+0x79/0x370 [ 1178.587743] ? strndup_user+0x74/0xe0 [ 1178.588521] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.589458] memdup_user+0x22/0xd0 [ 1178.590177] strndup_user+0x74/0xe0 [ 1178.590945] __x64_sys_mount+0x133/0x300 [ 1178.591763] ? copy_mnt_ns+0xa00/0xa00 [ 1178.592546] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.593593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.594633] do_syscall_64+0x33/0x40 [ 1178.595414] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.596448] RIP: 0033:0x7ff72614904a [ 1178.597200] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.600923] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.602447] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1178.603904] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.605342] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1178.606805] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.608242] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1178.620887] FAULT_INJECTION: forcing a failure. [ 1178.620887] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.623215] CPU: 1 PID: 9676 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1178.624606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.626278] Call Trace: [ 1178.626823] dump_stack+0x107/0x167 [ 1178.627574] should_fail.cold+0x5/0xa [ 1178.628376] should_failslab+0x5/0x20 [ 1178.629166] __kmalloc_track_caller+0x79/0x370 [ 1178.630113] ? strndup_user+0x74/0xe0 [ 1178.630922] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.631862] memdup_user+0x22/0xd0 [ 1178.632588] strndup_user+0x74/0xe0 [ 1178.633323] __x64_sys_mount+0x133/0x300 [ 1178.634150] ? copy_mnt_ns+0xa00/0xa00 [ 1178.634954] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.636003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.637042] do_syscall_64+0x33/0x40 [ 1178.637790] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.638842] RIP: 0033:0x7f101d10c04a [ 1178.639586] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.643262] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.644790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1178.646217] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.647649] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1178.649074] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.650495] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1178.691434] FAULT_INJECTION: forcing a failure. [ 1178.691434] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.693769] CPU: 1 PID: 9678 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1178.695189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.696870] Call Trace: [ 1178.697412] dump_stack+0x107/0x167 [ 1178.698164] should_fail.cold+0x5/0xa [ 1178.698970] ? create_object.isra.0+0x3a/0xa20 [ 1178.699923] should_failslab+0x5/0x20 [ 1178.700731] kmem_cache_alloc+0x5b/0x310 [ 1178.701580] ? ksys_write+0x21a/0x260 [ 1178.702369] create_object.isra.0+0x3a/0xa20 [ 1178.703267] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.704298] kmem_cache_alloc+0x159/0x310 [ 1178.705509] getname_flags.part.0+0x50/0x4f0 [ 1178.706761] getname_flags+0x9a/0xe0 [ 1178.707727] do_mkdirat+0x8f/0x2b0 [ 1178.708586] ? user_path_create+0xf0/0xf0 [ 1178.709587] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.710863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.712112] do_syscall_64+0x33/0x40 [ 1178.713124] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.714526] RIP: 0033:0x7fd4a1174c27 [ 1178.715286] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.719012] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1178.720654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a1174c27 [ 1178.722311] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1178.723777] RBP: 00007fd49e6eb040 R08: 0000000000000000 R09: 0000000002044034 [ 1178.725217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1178.726800] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1178.733232] FAULT_INJECTION: forcing a failure. [ 1178.733232] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.735539] CPU: 1 PID: 9679 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1178.736945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.738632] Call Trace: [ 1178.739192] dump_stack+0x107/0x167 [ 1178.739989] should_fail.cold+0x5/0xa [ 1178.740841] should_failslab+0x5/0x20 [ 1178.741615] __kmalloc_track_caller+0x79/0x370 [ 1178.742627] ? ext4_remount+0x39c/0x26e0 [ 1178.743682] kstrdup+0x36/0x70 [ 1178.744341] ext4_remount+0x39c/0x26e0 [ 1178.745152] ? ext4_register_li_request+0x8e0/0x8e0 [ 1178.746164] ? do_raw_spin_unlock+0x4f/0x220 [ 1178.747061] ? _raw_spin_unlock+0x1a/0x30 [ 1178.747906] ? shrink_dentry_list+0x134/0x500 [ 1178.748959] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1178.750349] ? shrink_dentry_list+0x500/0x500 [ 1178.751270] ? ext4_register_li_request+0x8e0/0x8e0 [ 1178.752284] legacy_reconfigure+0x11b/0x190 [ 1178.753160] reconfigure_super+0x414/0x9c0 [ 1178.754033] ? fs_umode_to_dtype+0xb0/0xb0 [ 1178.754899] path_mount+0x1a75/0x20b0 [ 1178.755802] ? strncpy_from_user+0x9e/0x470 [ 1178.756922] ? finish_automount+0xa90/0xa90 [ 1178.757875] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.758831] __x64_sys_mount+0x282/0x300 [ 1178.759651] ? copy_mnt_ns+0xa00/0xa00 [ 1178.760441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.761496] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.762672] do_syscall_64+0x33/0x40 [ 1178.763444] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1178.764482] RIP: 0033:0x7f82ca37a04a [ 1178.765456] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.769286] RSP: 002b:00007f82c78edfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1178.770964] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca37a04a [ 1178.772657] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1178.774100] RBP: 00007f82c78ee040 R08: 00007f82c78ee040 R09: 0000000020000280 [ 1178.775547] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1178.777086] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1178.813065] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) 03:32:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:32:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:32:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:32:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:32:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, 0x0) 03:32:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) 03:32:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) [ 1194.109590] FAULT_INJECTION: forcing a failure. [ 1194.109590] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.112181] CPU: 1 PID: 9686 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1194.113748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.115477] Call Trace: [ 1194.116038] dump_stack+0x107/0x167 [ 1194.116786] should_fail.cold+0x5/0xa [ 1194.117572] ? getname_flags.part.0+0x50/0x4f0 [ 1194.118526] should_failslab+0x5/0x20 [ 1194.119338] kmem_cache_alloc+0x5b/0x310 [ 1194.120175] getname_flags.part.0+0x50/0x4f0 [ 1194.121189] user_path_at_empty+0xa1/0x100 [ 1194.122256] __x64_sys_mount+0x1e9/0x300 [ 1194.123226] ? copy_mnt_ns+0xa00/0xa00 [ 1194.124052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.125100] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.126174] do_syscall_64+0x33/0x40 [ 1194.126923] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.127996] RIP: 0033:0x7f842a91904a [ 1194.128752] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.132765] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.134496] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1194.136024] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.137519] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1194.138995] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.140434] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1194.170997] FAULT_INJECTION: forcing a failure. [ 1194.170997] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.173780] CPU: 0 PID: 9693 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1194.175245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.176915] Call Trace: [ 1194.177458] dump_stack+0x107/0x167 [ 1194.178206] should_fail.cold+0x5/0xa [ 1194.178990] ? create_object.isra.0+0x3a/0xa20 [ 1194.179929] should_failslab+0x5/0x20 03:32:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) [ 1194.180705] kmem_cache_alloc+0x5b/0x310 [ 1194.181640] create_object.isra.0+0x3a/0xa20 [ 1194.182536] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.182997] FAULT_INJECTION: forcing a failure. [ 1194.182997] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.183583] __kmalloc_track_caller+0x177/0x370 [ 1194.186893] ? strndup_user+0x74/0xe0 [ 1194.187677] ? getname_flags.part.0+0x1dd/0x4f0 [ 1194.188797] memdup_user+0x22/0xd0 [ 1194.189522] strndup_user+0x74/0xe0 [ 1194.190283] __x64_sys_mount+0x133/0x300 [ 1194.191127] ? copy_mnt_ns+0xa00/0xa00 [ 1194.191916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.192974] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.194010] do_syscall_64+0x33/0x40 [ 1194.194763] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.195798] RIP: 0033:0x7ff72614904a [ 1194.196557] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.200241] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.201777] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1194.203209] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.204655] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1194.206074] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.207543] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1194.208985] CPU: 1 PID: 9692 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1194.210474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.210535] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.212172] Call Trace: [ 1194.212191] dump_stack+0x107/0x167 [ 1194.212214] should_fail.cold+0x5/0xa [ 1194.212234] ? create_object.isra.0+0x3a/0xa20 [ 1194.212258] should_failslab+0x5/0x20 [ 1194.217080] kmem_cache_alloc+0x5b/0x310 [ 1194.217913] create_object.isra.0+0x3a/0xa20 [ 1194.218804] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.219849] __kmalloc_track_caller+0x177/0x370 [ 1194.220793] ? strndup_user+0x74/0xe0 [ 1194.221566] ? getname_flags.part.0+0x1dd/0x4f0 [ 1194.222519] memdup_user+0x22/0xd0 [ 1194.223259] strndup_user+0x74/0xe0 [ 1194.224007] __x64_sys_mount+0x133/0x300 [ 1194.224836] ? copy_mnt_ns+0xa00/0xa00 [ 1194.225633] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.226697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.227755] do_syscall_64+0x33/0x40 [ 1194.228517] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.229561] RIP: 0033:0x7f101d10c04a [ 1194.230316] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.234043] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.235595] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1194.237045] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.238486] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1194.239935] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.241378] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1194.244136] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) [ 1194.253470] FAULT_INJECTION: forcing a failure. [ 1194.253470] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.255841] CPU: 1 PID: 9691 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1194.257336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.259077] Call Trace: [ 1194.259654] dump_stack+0x107/0x167 [ 1194.260421] should_fail.cold+0x5/0xa [ 1194.261240] ? create_object.isra.0+0x3a/0xa20 [ 1194.262187] should_failslab+0x5/0x20 [ 1194.263036] kmem_cache_alloc+0x5b/0x310 [ 1194.263876] create_object.isra.0+0x3a/0xa20 [ 1194.264775] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.265820] kmem_cache_alloc+0x159/0x310 [ 1194.266672] getname_flags.part.0+0x50/0x4f0 [ 1194.267580] getname+0x8e/0xd0 [ 1194.268241] do_sys_openat2+0xf9/0x420 [ 1194.269041] ? __kasan_slab_free+0x122/0x160 [ 1194.269934] ? build_open_flags+0x6f0/0x6f0 [ 1194.270826] ? __x64_sys_mount+0x227/0x300 [ 1194.271704] ? kfree+0xd7/0x340 [ 1194.272389] __x64_sys_openat+0x13f/0x1f0 [ 1194.273235] ? __ia32_sys_open+0x1c0/0x1c0 [ 1194.274114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.275185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.276261] do_syscall_64+0x33/0x40 [ 1194.277022] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.278072] RIP: 0033:0x7f82ca32ba04 [ 1194.278830] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1194.282141] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.282592] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1194.282612] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1194.282631] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1194.288249] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1194.289727] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1194.291256] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1194.300228] FAULT_INJECTION: forcing a failure. [ 1194.300228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1194.303081] CPU: 0 PID: 9695 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1194.304497] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.306467] Call Trace: [ 1194.307029] dump_stack+0x107/0x167 [ 1194.307904] should_fail.cold+0x5/0xa [ 1194.308696] strncpy_from_user+0x34/0x470 [ 1194.309687] getname_flags.part.0+0x95/0x4f0 [ 1194.310616] user_path_at_empty+0xa1/0x100 [ 1194.311494] __x64_sys_mount+0x1e9/0x300 [ 1194.312470] ? copy_mnt_ns+0xa00/0xa00 [ 1194.313300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.314549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.315662] do_syscall_64+0x33/0x40 [ 1194.316554] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.317627] RIP: 0033:0x7efe557f004a [ 1194.318517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.322237] RSP: 002b:00007efe52d42fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1194.324056] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1194.325498] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.326956] RBP: 00007efe52d43040 R08: 00007efe52d43040 R09: 0000000020000280 [ 1194.328402] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1194.329838] R13: 0000000020000080 R14: 00007efe52d43000 R15: 0000000020000180 [ 1194.345565] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.363999] FAULT_INJECTION: forcing a failure. [ 1194.363999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1194.366737] CPU: 0 PID: 9697 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1194.368164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.369888] Call Trace: [ 1194.370439] dump_stack+0x107/0x167 [ 1194.371224] should_fail.cold+0x5/0xa [ 1194.372044] strncpy_from_user+0x34/0x470 [ 1194.373060] getname_flags.part.0+0x95/0x4f0 [ 1194.374014] getname_flags+0x9a/0xe0 [ 1194.374879] do_mkdirat+0x8f/0x2b0 [ 1194.375751] ? user_path_create+0xf0/0xf0 [ 1194.376640] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.377885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.378968] do_syscall_64+0x33/0x40 [ 1194.379869] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.380912] RIP: 0033:0x7fd4a1174c27 [ 1194.381803] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.385525] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1194.387360] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a1174c27 [ 1194.388799] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1194.390235] RBP: 00007fd49e6eb040 R08: 0000000000000000 R09: 0000000002044034 [ 1194.391683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1194.393126] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 03:32:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) 03:32:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) [ 1194.423444] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:32:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) 03:32:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:32:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:32:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) [ 1194.596084] FAULT_INJECTION: forcing a failure. [ 1194.596084] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.598491] CPU: 1 PID: 9703 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1194.599903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.601405] Call Trace: [ 1194.601889] dump_stack+0x107/0x167 [ 1194.602612] should_fail.cold+0x5/0xa [ 1194.603390] ? create_object.isra.0+0x3a/0xa20 [ 1194.604305] should_failslab+0x5/0x20 [ 1194.605062] kmem_cache_alloc+0x5b/0x310 [ 1194.605870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.606911] create_object.isra.0+0x3a/0xa20 [ 1194.607788] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.608798] kmem_cache_alloc+0x159/0x310 [ 1194.609615] getname_flags.part.0+0x50/0x4f0 [ 1194.610489] user_path_at_empty+0xa1/0x100 [ 1194.611333] __x64_sys_mount+0x1e9/0x300 [ 1194.612136] ? copy_mnt_ns+0xa00/0xa00 [ 1194.612915] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.613955] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.614996] do_syscall_64+0x33/0x40 [ 1194.615728] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.616743] RIP: 0033:0x7f842a91904a [ 1194.617464] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.621069] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.622566] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1194.623982] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.625382] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1194.626782] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.628195] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1194.648496] FAULT_INJECTION: forcing a failure. [ 1194.648496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1194.650867] CPU: 0 PID: 9706 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1194.652245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.653941] Call Trace: [ 1194.654491] dump_stack+0x107/0x167 [ 1194.655256] should_fail.cold+0x5/0xa [ 1194.655475] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.656096] _copy_from_user+0x2e/0x1b0 [ 1194.656122] memdup_user+0x65/0xd0 [ 1194.656143] strndup_user+0x74/0xe0 [ 1194.656170] __x64_sys_mount+0x133/0x300 [ 1194.660380] ? copy_mnt_ns+0xa00/0xa00 [ 1194.661164] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.662243] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.663309] do_syscall_64+0x33/0x40 [ 1194.664074] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.665089] RIP: 0033:0x7ff72614904a [ 1194.665841] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.669546] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.671088] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1194.672506] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.673922] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1194.675358] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.676790] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1194.689311] FAULT_INJECTION: forcing a failure. [ 1194.689311] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.691748] CPU: 1 PID: 9709 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1194.693122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.694788] Call Trace: [ 1194.695332] dump_stack+0x107/0x167 [ 1194.696068] should_fail.cold+0x5/0xa [ 1194.696838] ? getname_flags.part.0+0x50/0x4f0 [ 1194.697754] should_failslab+0x5/0x20 [ 1194.698512] kmem_cache_alloc+0x5b/0x310 [ 1194.699341] getname_flags.part.0+0x50/0x4f0 [ 1194.700232] getname_flags+0x9a/0xe0 [ 1194.700990] do_mkdirat+0x8f/0x2b0 [ 1194.701708] ? user_path_create+0xf0/0xf0 [ 1194.702547] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.703619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.704668] do_syscall_64+0x33/0x40 [ 1194.705418] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.706455] RIP: 0033:0x7f18473bcc27 [ 1194.707212] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.710930] RSP: 002b:00007f1844932fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1194.712495] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bcc27 [ 1194.713924] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1194.715361] RBP: 00007f1844933040 R08: 0000000000000000 R09: 0000000002044034 [ 1194.716800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1194.718232] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1194.734009] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.764154] FAULT_INJECTION: forcing a failure. [ 1194.764154] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.766537] CPU: 1 PID: 9712 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1194.767916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.769589] Call Trace: [ 1194.770138] dump_stack+0x107/0x167 [ 1194.770886] should_fail.cold+0x5/0xa [ 1194.771669] ? create_object.isra.0+0x3a/0xa20 [ 1194.772602] should_failslab+0x5/0x20 [ 1194.773392] kmem_cache_alloc+0x5b/0x310 [ 1194.774223] create_object.isra.0+0x3a/0xa20 [ 1194.775130] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1194.776146] __kmalloc_track_caller+0x177/0x370 [ 1194.777076] ? strndup_user+0x74/0xe0 [ 1194.777834] ? getname_flags.part.0+0x1dd/0x4f0 [ 1194.778781] memdup_user+0x22/0xd0 [ 1194.779515] strndup_user+0x74/0xe0 [ 1194.780259] __x64_sys_mount+0x133/0x300 [ 1194.781085] ? copy_mnt_ns+0xa00/0xa00 [ 1194.781881] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.782234] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.782945] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.782979] do_syscall_64+0x33/0x40 [ 1194.785898] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.786950] RIP: 0033:0x7f101d10c04a [ 1194.787708] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.791456] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.792993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1194.794405] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.795839] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1194.797265] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.798703] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1194.802106] FAULT_INJECTION: forcing a failure. [ 1194.802106] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.804376] CPU: 1 PID: 9713 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1194.805748] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.807423] Call Trace: [ 1194.807958] dump_stack+0x107/0x167 [ 1194.808693] should_fail.cold+0x5/0xa [ 1194.809458] should_failslab+0x5/0x20 [ 1194.810224] __kmalloc_track_caller+0x79/0x370 [ 1194.811151] ? strndup_user+0x74/0xe0 [ 1194.811919] ? getname_flags.part.0+0x1dd/0x4f0 [ 1194.812880] memdup_user+0x22/0xd0 [ 1194.813594] strndup_user+0x74/0xe0 [ 1194.814342] __x64_sys_mount+0x133/0x300 [ 1194.815079] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.815182] ? copy_mnt_ns+0xa00/0xa00 [ 1194.817091] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.818144] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.819182] do_syscall_64+0x33/0x40 [ 1194.819939] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.820982] RIP: 0033:0x7fd4a117704a [ 1194.821733] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.825658] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.827193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1194.828610] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.830026] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1194.831474] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.832889] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1194.843569] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1194.847240] FAULT_INJECTION: forcing a failure. [ 1194.847240] name failslab, interval 1, probability 0, space 0, times 0 [ 1194.849517] CPU: 1 PID: 9714 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1194.851057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.852738] Call Trace: [ 1194.853262] dump_stack+0x107/0x167 [ 1194.854011] should_fail.cold+0x5/0xa [ 1194.854779] ? alloc_fs_context+0x57/0x840 [ 1194.855653] should_failslab+0x5/0x20 [ 1194.856433] kmem_cache_alloc_trace+0x55/0x320 [ 1194.857353] ? cap_capable+0x1d6/0x240 [ 1194.858148] alloc_fs_context+0x57/0x840 [ 1194.858976] path_mount+0x931/0x20b0 [ 1194.859733] ? strncpy_from_user+0x9e/0x470 [ 1194.860598] ? finish_automount+0xa90/0xa90 [ 1194.861481] ? getname_flags.part.0+0x1dd/0x4f0 [ 1194.862434] __x64_sys_mount+0x282/0x300 [ 1194.863266] ? copy_mnt_ns+0xa00/0xa00 [ 1194.864056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.865106] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.866151] do_syscall_64+0x33/0x40 [ 1194.866907] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.867947] RIP: 0033:0x7efe557f004a [ 1194.868700] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1194.872434] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1194.873967] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1194.875439] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1194.876867] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1194.878294] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1194.879714] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1194.882784] FAULT_INJECTION: forcing a failure. [ 1194.882784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1194.885242] CPU: 1 PID: 9715 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1194.886686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1194.888574] Call Trace: [ 1194.889105] dump_stack+0x107/0x167 [ 1194.889854] should_fail.cold+0x5/0xa [ 1194.890620] strncpy_from_user+0x34/0x470 [ 1194.891473] getname_flags.part.0+0x95/0x4f0 [ 1194.892357] getname+0x8e/0xd0 [ 1194.893003] do_sys_openat2+0xf9/0x420 [ 1194.893780] ? __kasan_slab_free+0x122/0x160 [ 1194.894659] ? build_open_flags+0x6f0/0x6f0 [ 1194.895580] ? __x64_sys_mount+0x227/0x300 [ 1194.896566] ? kfree+0xd7/0x340 [ 1194.897349] __x64_sys_openat+0x13f/0x1f0 [ 1194.898190] ? __ia32_sys_open+0x1c0/0x1c0 [ 1194.899064] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1194.900137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1194.901187] do_syscall_64+0x33/0x40 [ 1194.901949] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1194.902978] RIP: 0033:0x7f82ca32ba04 [ 1194.903735] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1194.907656] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1194.909249] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1194.910678] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1194.912131] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1194.913666] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1194.915274] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:33:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:33:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) 03:33:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:33:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:33:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:33:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) 03:33:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) 03:33:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 1) [ 1208.061322] FAULT_INJECTION: forcing a failure. [ 1208.061322] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.063918] CPU: 0 PID: 9728 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1208.065456] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.067332] Call Trace: [ 1208.067931] dump_stack+0x107/0x167 [ 1208.068762] should_fail.cold+0x5/0xa [ 1208.069609] ? create_object.isra.0+0x3a/0xa20 [ 1208.070629] should_failslab+0x5/0x20 [ 1208.071511] kmem_cache_alloc+0x5b/0x310 [ 1208.072413] ? ksys_write+0x21a/0x260 [ 1208.073210] create_object.isra.0+0x3a/0xa20 [ 1208.074113] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.075186] kmem_cache_alloc+0x159/0x310 [ 1208.076040] getname_flags.part.0+0x50/0x4f0 [ 1208.076938] getname_flags+0x9a/0xe0 [ 1208.077696] do_mkdirat+0x8f/0x2b0 [ 1208.078426] ? user_path_create+0xf0/0xf0 [ 1208.079289] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.080370] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.081429] do_syscall_64+0x33/0x40 [ 1208.082193] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.083236] RIP: 0033:0x7f18473bcc27 [ 1208.084013] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.087162] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.087781] RSP: 002b:00007f1844932fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1208.087802] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bcc27 [ 1208.087813] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1208.087823] RBP: 00007f1844933040 R08: 0000000000000000 R09: 0000000002044034 [ 1208.087834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1208.087855] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1208.089498] FAULT_INJECTION: forcing a failure. [ 1208.089498] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.098745] CPU: 1 PID: 9727 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1208.099798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.101075] Call Trace: [ 1208.101483] dump_stack+0x107/0x167 [ 1208.102048] should_fail.cold+0x5/0xa [ 1208.102657] ? create_object.isra.0+0x3a/0xa20 [ 1208.103381] should_failslab+0x5/0x20 [ 1208.103857] kmem_cache_alloc+0x5b/0x310 [ 1208.104328] create_object.isra.0+0x3a/0xa20 [ 1208.104830] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.105498] kmem_cache_alloc+0x159/0x310 [ 1208.105969] getname_flags.part.0+0x50/0x4f0 [ 1208.106497] getname+0x8e/0xd0 [ 1208.106909] do_sys_openat2+0xf9/0x420 [ 1208.107395] ? __kasan_slab_free+0x122/0x160 [ 1208.107927] ? build_open_flags+0x6f0/0x6f0 [ 1208.108405] ? __x64_sys_mount+0x227/0x300 [ 1208.108875] ? kfree+0xd7/0x340 [ 1208.109245] __x64_sys_openat+0x13f/0x1f0 [ 1208.109712] ? __ia32_sys_open+0x1c0/0x1c0 [ 1208.110184] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.110765] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.111384] do_syscall_64+0x33/0x40 [ 1208.111797] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.112358] RIP: 0033:0x7f82ca32ba04 [ 1208.112775] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1208.114801] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1208.115653] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1208.116484] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1208.117310] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1208.118132] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1208.118954] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1208.120759] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.122512] FAULT_INJECTION: forcing a failure. [ 1208.122512] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.123931] CPU: 1 PID: 9731 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1208.124751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.125769] Call Trace: [ 1208.126073] dump_stack+0x107/0x167 [ 1208.126493] should_fail.cold+0x5/0xa [ 1208.126936] ? copy_mount_options+0x55/0x180 [ 1208.127448] should_failslab+0x5/0x20 [ 1208.127974] kmem_cache_alloc_trace+0x55/0x320 [ 1208.128500] ? _copy_from_user+0xfb/0x1b0 [ 1208.128994] copy_mount_options+0x55/0x180 [ 1208.129489] __x64_sys_mount+0x1a8/0x300 [ 1208.129969] ? copy_mnt_ns+0xa00/0xa00 [ 1208.130419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.131029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.131639] do_syscall_64+0x33/0x40 [ 1208.132068] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.132663] RIP: 0033:0x7ff72614904a [ 1208.133094] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.135131] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.135966] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1208.136739] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.137512] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1208.138286] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.139071] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1208.143004] FAULT_INJECTION: forcing a failure. [ 1208.143004] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.145545] CPU: 0 PID: 9730 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1208.147067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.148929] Call Trace: [ 1208.149516] dump_stack+0x107/0x167 [ 1208.150337] should_fail.cold+0x5/0xa [ 1208.151194] ? create_object.isra.0+0x3a/0xa20 [ 1208.152233] should_failslab+0x5/0x20 [ 1208.153093] kmem_cache_alloc+0x5b/0x310 [ 1208.154028] create_object.isra.0+0x3a/0xa20 [ 1208.154116] FAULT_INJECTION: forcing a failure. [ 1208.154116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1208.155011] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.155038] kmem_cache_alloc_trace+0x151/0x320 [ 1208.155068] ? cap_capable+0x1d6/0x240 [ 1208.160800] alloc_fs_context+0x57/0x840 [ 1208.161719] path_mount+0x931/0x20b0 [ 1208.162471] ? strncpy_from_user+0x9e/0x470 [ 1208.163372] ? finish_automount+0xa90/0xa90 [ 1208.164304] ? getname_flags.part.0+0x1dd/0x4f0 [ 1208.165350] __x64_sys_mount+0x282/0x300 [ 1208.166195] ? copy_mnt_ns+0xa00/0xa00 [ 1208.167022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.168148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.169312] do_syscall_64+0x33/0x40 [ 1208.170159] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.171245] RIP: 0033:0x7efe557f004a [ 1208.172064] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.176120] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.177819] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1208.179325] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.180916] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1208.182417] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.183992] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1208.185596] CPU: 1 PID: 9729 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1208.186240] FAULT_INJECTION: forcing a failure. [ 1208.186240] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.187008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.187014] Call Trace: [ 1208.187037] dump_stack+0x107/0x167 [ 1208.187063] should_fail.cold+0x5/0xa [ 1208.193199] strncpy_from_user+0x34/0x470 [ 1208.194064] getname_flags.part.0+0x95/0x4f0 [ 1208.194956] user_path_at_empty+0xa1/0x100 [ 1208.195830] __x64_sys_mount+0x1e9/0x300 [ 1208.196648] ? copy_mnt_ns+0xa00/0xa00 [ 1208.197436] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.198497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.199548] do_syscall_64+0x33/0x40 [ 1208.200322] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.201367] RIP: 0033:0x7f842a91904a [ 1208.202124] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.205840] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.207409] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1208.208864] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.210332] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1208.211776] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.213211] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1208.214681] CPU: 0 PID: 9732 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1208.216233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.218077] Call Trace: [ 1208.218698] dump_stack+0x107/0x167 [ 1208.219541] should_fail.cold+0x5/0xa [ 1208.219843] FAULT_INJECTION: forcing a failure. [ 1208.219843] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.220374] ? copy_mount_options+0x55/0x180 [ 1208.223545] should_failslab+0x5/0x20 [ 1208.224382] kmem_cache_alloc_trace+0x55/0x320 [ 1208.225402] ? _copy_from_user+0xfb/0x1b0 [ 1208.226275] copy_mount_options+0x55/0x180 [ 1208.227138] __x64_sys_mount+0x1a8/0x300 [ 1208.227979] ? copy_mnt_ns+0xa00/0xa00 [ 1208.228855] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.229998] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.231040] do_syscall_64+0x33/0x40 [ 1208.231819] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.232956] RIP: 0033:0x7f101d10c04a [ 1208.233779] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.237763] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.239300] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1208.240845] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.242432] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1208.243920] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.245511] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1208.247158] CPU: 1 PID: 9733 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1208.248596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.250362] Call Trace: [ 1208.251061] dump_stack+0x107/0x167 [ 1208.251988] should_fail.cold+0x5/0xa [ 1208.252946] ? getname_flags.part.0+0x50/0x4f0 [ 1208.253992] should_failslab+0x5/0x20 [ 1208.254857] kmem_cache_alloc+0x5b/0x310 [ 1208.255803] getname_flags.part.0+0x50/0x4f0 [ 1208.256881] getname_flags+0x9a/0xe0 [ 1208.257716] do_mkdirat+0x8f/0x2b0 [ 1208.258523] ? user_path_create+0xf0/0xf0 [ 1208.259417] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.260498] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.261547] do_syscall_64+0x33/0x40 [ 1208.262310] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.263356] RIP: 0033:0x7f05a88b1c27 [ 1208.264126] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.267890] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1208.269438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b1c27 [ 1208.270905] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1208.272347] RBP: 00007f05a5e28040 R08: 0000000000000000 R09: 0000000002044034 [ 1208.273792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1208.274159] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.275245] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1208.281953] FAULT_INJECTION: forcing a failure. [ 1208.281953] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.284305] CPU: 1 PID: 9734 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1208.285704] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.287393] Call Trace: [ 1208.287944] dump_stack+0x107/0x167 [ 1208.288789] should_fail.cold+0x5/0xa [ 1208.289758] ? create_object.isra.0+0x3a/0xa20 [ 1208.290696] should_failslab+0x5/0x20 [ 1208.291561] kmem_cache_alloc+0x5b/0x310 [ 1208.292486] create_object.isra.0+0x3a/0xa20 [ 1208.293513] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.294654] __kmalloc_track_caller+0x177/0x370 [ 1208.295769] ? strndup_user+0x74/0xe0 [ 1208.296617] ? getname_flags.part.0+0x1dd/0x4f0 [ 1208.297708] memdup_user+0x22/0xd0 [ 1208.298594] strndup_user+0x74/0xe0 [ 1208.299382] __x64_sys_mount+0x133/0x300 [ 1208.300306] ? copy_mnt_ns+0xa00/0xa00 [ 1208.301266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.302418] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.303649] do_syscall_64+0x33/0x40 [ 1208.304508] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.305660] RIP: 0033:0x7fd4a117704a [ 1208.306505] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.310758] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.312420] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1208.314016] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.315643] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1208.317196] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.318801] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 03:33:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) 03:33:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) 03:33:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:33:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) [ 1208.408911] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.411432] FAULT_INJECTION: forcing a failure. [ 1208.411432] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.414165] CPU: 1 PID: 9736 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1208.415741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.417661] Call Trace: [ 1208.418329] dump_stack+0x107/0x167 [ 1208.419094] should_fail.cold+0x5/0xa [ 1208.419910] ? create_object.isra.0+0x3a/0xa20 [ 1208.420864] should_failslab+0x5/0x20 [ 1208.421649] kmem_cache_alloc+0x5b/0x310 [ 1208.422492] create_object.isra.0+0x3a/0xa20 [ 1208.423426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.424493] kmem_cache_alloc+0x159/0x310 [ 1208.425362] __alloc_file+0x21/0x320 [ 1208.426130] alloc_empty_file+0x6d/0x170 [ 1208.426967] path_openat+0xe3/0x26f0 [ 1208.427763] ? path_lookupat+0x860/0x860 [ 1208.428604] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1208.429669] ? SOFTIRQ_verbose+0x10/0x10 [ 1208.430518] do_filp_open+0x190/0x3e0 [ 1208.431325] ? may_open_dev+0xf0/0xf0 [ 1208.432115] ? __alloc_fd+0x2b8/0x630 [ 1208.432906] ? lock_downgrade+0x6d0/0x6d0 [ 1208.433755] ? do_raw_spin_lock+0x121/0x260 [ 1208.434633] ? rwlock_bug.part.0+0x90/0x90 [ 1208.435522] ? _raw_spin_unlock+0x1a/0x30 [ 1208.436367] ? __alloc_fd+0x2b8/0x630 [ 1208.437171] do_sys_openat2+0x171/0x420 [ 1208.438003] ? __kasan_slab_free+0x122/0x160 [ 1208.438915] ? build_open_flags+0x6f0/0x6f0 [ 1208.439847] ? __x64_sys_mount+0x227/0x300 [ 1208.440727] ? kfree+0xd7/0x340 [ 1208.441431] __x64_sys_openat+0x13f/0x1f0 [ 1208.442288] ? __ia32_sys_open+0x1c0/0x1c0 [ 1208.443185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.444278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.445336] do_syscall_64+0x33/0x40 [ 1208.446127] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.447195] RIP: 0033:0x7f82ca32ba04 [ 1208.447956] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1208.451758] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1208.453339] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1208.454891] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1208.456516] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1208.458131] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1208.459763] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 03:33:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) [ 1208.475618] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.480221] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:33:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) [ 1208.537806] FAULT_INJECTION: forcing a failure. [ 1208.537806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1208.539753] CPU: 1 PID: 9739 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1208.540822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.542129] Call Trace: [ 1208.542548] dump_stack+0x107/0x167 [ 1208.543119] should_fail.cold+0x5/0xa [ 1208.543752] strncpy_from_user+0x34/0x470 [ 1208.544406] getname_flags.part.0+0x95/0x4f0 [ 1208.545093] getname_flags+0x9a/0xe0 [ 1208.545669] do_mkdirat+0x8f/0x2b0 [ 1208.546233] ? user_path_create+0xf0/0xf0 [ 1208.546874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.547717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.548540] do_syscall_64+0x33/0x40 [ 1208.549131] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.549944] RIP: 0033:0x7f18473bcc27 [ 1208.550523] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.553394] RSP: 002b:00007f1844932fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1208.554573] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bcc27 [ 1208.555684] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1208.556758] RBP: 00007f1844933040 R08: 0000000000000000 R09: 0000000002044034 [ 1208.557834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1208.558931] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 03:33:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 2) [ 1208.610424] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:33:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) [ 1208.647102] FAULT_INJECTION: forcing a failure. [ 1208.647102] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.649528] CPU: 0 PID: 9743 Comm: syz-executor.6 Not tainted 5.10.202 #1 03:33:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) [ 1208.651325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.653446] Call Trace: [ 1208.653996] dump_stack+0x107/0x167 [ 1208.654760] should_fail.cold+0x5/0xa [ 1208.655567] ? legacy_init_fs_context+0x44/0xe0 [ 1208.656534] should_failslab+0x5/0x20 [ 1208.657310] kmem_cache_alloc_trace+0x55/0x320 [ 1208.658234] ? lockdep_init_map_type+0x2c7/0x780 [ 1208.659210] legacy_init_fs_context+0x44/0xe0 [ 1208.660126] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1208.661124] alloc_fs_context+0x4fd/0x840 [ 1208.661965] path_mount+0x931/0x20b0 [ 1208.662716] ? strncpy_from_user+0x9e/0x470 [ 1208.663608] ? finish_automount+0xa90/0xa90 [ 1208.664469] ? getname_flags.part.0+0x1dd/0x4f0 [ 1208.665412] __x64_sys_mount+0x282/0x300 [ 1208.666223] ? copy_mnt_ns+0xa00/0xa00 [ 1208.667008] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.668074] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.669110] do_syscall_64+0x33/0x40 [ 1208.669875] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.670900] RIP: 0033:0x7efe557f004a [ 1208.671655] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.675353] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.676877] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1208.678295] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.679721] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1208.681143] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.682577] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1208.691630] FAULT_INJECTION: forcing a failure. [ 1208.691630] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.694287] CPU: 0 PID: 9744 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1208.695670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.697326] Call Trace: [ 1208.697873] dump_stack+0x107/0x167 [ 1208.698616] should_fail.cold+0x5/0xa [ 1208.699411] ? create_object.isra.0+0x3a/0xa20 [ 1208.700351] should_failslab+0x5/0x20 [ 1208.701134] kmem_cache_alloc+0x5b/0x310 [ 1208.702097] create_object.isra.0+0x3a/0xa20 [ 1208.702988] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.704042] kmem_cache_alloc_trace+0x151/0x320 [ 1208.705016] copy_mount_options+0x55/0x180 [ 1208.705894] __x64_sys_mount+0x1a8/0x300 [ 1208.706724] ? copy_mnt_ns+0xa00/0xa00 [ 1208.707536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.708600] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.709666] do_syscall_64+0x33/0x40 [ 1208.710443] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.711507] RIP: 0033:0x7ff72614904a [ 1208.712255] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.715979] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.717496] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1208.718918] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.720347] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1208.721790] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.723230] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1208.733330] FAULT_INJECTION: forcing a failure. [ 1208.733330] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.735402] CPU: 1 PID: 9745 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1208.736573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.738122] Call Trace: [ 1208.738537] dump_stack+0x107/0x167 [ 1208.739134] should_fail.cold+0x5/0xa [ 1208.739281] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.739743] ? create_object.isra.0+0x3a/0xa20 [ 1208.739774] should_failslab+0x5/0x20 [ 1208.742223] kmem_cache_alloc+0x5b/0x310 [ 1208.742863] create_object.isra.0+0x3a/0xa20 [ 1208.743549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.744440] kmem_cache_alloc_trace+0x151/0x320 [ 1208.745325] copy_mount_options+0x55/0x180 [ 1208.746119] __x64_sys_mount+0x1a8/0x300 [ 1208.746839] ? copy_mnt_ns+0xa00/0xa00 [ 1208.747602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.748545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.749527] do_syscall_64+0x33/0x40 [ 1208.750262] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.751163] RIP: 0033:0x7f101d10c04a [ 1208.751821] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.754860] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.756051] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1208.757151] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.758262] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1208.759548] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.760721] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1208.839571] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1208.870050] FAULT_INJECTION: forcing a failure. [ 1208.870050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1208.872156] CPU: 1 PID: 9748 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1208.873221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.874519] Call Trace: [ 1208.874940] dump_stack+0x107/0x167 [ 1208.875521] should_fail.cold+0x5/0xa [ 1208.876125] _copy_from_user+0x2e/0x1b0 [ 1208.876755] memdup_user+0x65/0xd0 [ 1208.877315] strndup_user+0x74/0xe0 [ 1208.877891] __x64_sys_mount+0x133/0x300 [ 1208.878532] ? copy_mnt_ns+0xa00/0xa00 [ 1208.879139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.879970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.880775] do_syscall_64+0x33/0x40 [ 1208.881352] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.882152] RIP: 0033:0x7fd4a117704a [ 1208.882732] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.885610] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1208.886798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1208.887900] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1208.889132] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1208.890336] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1208.891591] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1208.982605] FAULT_INJECTION: forcing a failure. [ 1208.982605] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.984469] CPU: 1 PID: 9753 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1208.985538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1208.986826] Call Trace: [ 1208.987248] dump_stack+0x107/0x167 [ 1208.987842] should_fail.cold+0x5/0xa [ 1208.988464] ? create_object.isra.0+0x3a/0xa20 [ 1208.989194] should_failslab+0x5/0x20 [ 1208.989805] kmem_cache_alloc+0x5b/0x310 [ 1208.990440] ? ksys_write+0x21a/0x260 [ 1208.991028] create_object.isra.0+0x3a/0xa20 [ 1208.991720] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1208.992514] kmem_cache_alloc+0x159/0x310 [ 1208.993172] getname_flags.part.0+0x50/0x4f0 [ 1208.993865] getname_flags+0x9a/0xe0 [ 1208.994436] do_mkdirat+0x8f/0x2b0 [ 1208.994987] ? user_path_create+0xf0/0xf0 [ 1208.995643] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1208.996465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1208.997274] do_syscall_64+0x33/0x40 [ 1208.997856] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1208.998654] RIP: 0033:0x7f05a88b1c27 [ 1208.999231] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.002093] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1209.003300] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b1c27 [ 1209.004412] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1209.005513] RBP: 00007f05a5e28040 R08: 0000000000000000 R09: 0000000002044034 [ 1209.006606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1209.007717] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1209.023082] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1209.031246] FAULT_INJECTION: forcing a failure. [ 1209.031246] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1209.033717] CPU: 0 PID: 9754 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1209.035108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.036832] Call Trace: [ 1209.037369] dump_stack+0x107/0x167 [ 1209.038140] should_fail.cold+0x5/0xa [ 1209.038942] strncpy_from_user+0x34/0x470 [ 1209.039831] getname_flags.part.0+0x95/0x4f0 [ 1209.040760] user_path_at_empty+0xa1/0x100 [ 1209.041641] __x64_sys_mount+0x1e9/0x300 [ 1209.042485] ? copy_mnt_ns+0xa00/0xa00 [ 1209.043288] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.044367] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.045434] do_syscall_64+0x33/0x40 [ 1209.046201] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1209.047247] RIP: 0033:0x7f842a91904a [ 1209.047996] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.051705] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1209.053253] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1209.054713] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1209.056168] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1209.057635] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1209.059084] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1209.077587] FAULT_INJECTION: forcing a failure. [ 1209.077587] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.079907] CPU: 0 PID: 9755 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1209.081307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1209.082990] Call Trace: [ 1209.083539] dump_stack+0x107/0x167 [ 1209.084300] should_fail.cold+0x5/0xa [ 1209.085097] should_failslab+0x5/0x20 [ 1209.085888] __kmalloc_track_caller+0x79/0x370 [ 1209.086831] ? strndup_user+0x74/0xe0 [ 1209.087632] ? getname_flags.part.0+0x1dd/0x4f0 [ 1209.088587] memdup_user+0x22/0xd0 [ 1209.089308] strndup_user+0x74/0xe0 [ 1209.090045] __x64_sys_mount+0x133/0x300 [ 1209.090861] ? copy_mnt_ns+0xa00/0xa00 [ 1209.091681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1209.092750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1209.093795] do_syscall_64+0x33/0x40 [ 1209.094538] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1209.095596] RIP: 0033:0x7f18473bf04a [ 1209.096344] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.100045] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1209.101674] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1209.103113] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1209.104563] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1209.106005] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1209.107442] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 03:33:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:33:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) 03:33:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:33:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) 03:33:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) 03:33:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) 03:33:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:33:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 3) [ 1223.089757] FAULT_INJECTION: forcing a failure. [ 1223.089757] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.091314] CPU: 1 PID: 9766 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1223.092313] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.093423] Call Trace: [ 1223.093835] dump_stack+0x107/0x167 [ 1223.094376] should_fail.cold+0x5/0xa [ 1223.094864] ? create_object.isra.0+0x3a/0xa20 [ 1223.095456] should_failslab+0x5/0x20 [ 1223.095938] kmem_cache_alloc+0x5b/0x310 [ 1223.096438] create_object.isra.0+0x3a/0xa20 [ 1223.096968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1223.097579] __kmalloc_track_caller+0x177/0x370 [ 1223.098138] ? strndup_user+0x74/0xe0 [ 1223.098599] ? getname_flags.part.0+0x1dd/0x4f0 [ 1223.099145] memdup_user+0x22/0xd0 [ 1223.099599] strndup_user+0x74/0xe0 [ 1223.100047] __x64_sys_mount+0x133/0x300 [ 1223.100542] ? copy_mnt_ns+0xa00/0xa00 [ 1223.101016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.101650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.102280] do_syscall_64+0x33/0x40 [ 1223.102736] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.103364] RIP: 0033:0x7f18473bf04a [ 1223.103813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.106010] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.106930] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1223.107766] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.108614] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1223.109436] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.110292] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1223.117189] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.123478] FAULT_INJECTION: forcing a failure. [ 1223.123478] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.124908] CPU: 1 PID: 9771 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1223.125003] FAULT_INJECTION: forcing a failure. [ 1223.125003] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.125732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.125736] Call Trace: [ 1223.125746] dump_stack+0x107/0x167 [ 1223.125760] should_fail.cold+0x5/0xa [ 1223.125782] ? create_object.isra.0+0x3a/0xa20 [ 1223.130680] should_failslab+0x5/0x20 [ 1223.131136] kmem_cache_alloc+0x5b/0x310 [ 1223.131633] ? create_object.isra.0+0x3ad/0xa20 [ 1223.132189] create_object.isra.0+0x3a/0xa20 [ 1223.132715] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1223.133322] __kmalloc_node+0x1ae/0x420 [ 1223.133810] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1223.134424] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1223.134991] ? trace_hardirqs_on+0x5b/0x180 [ 1223.135513] kmem_cache_alloc_trace+0x169/0x320 [ 1223.136071] alloc_fs_context+0x57/0x840 [ 1223.136563] path_mount+0x931/0x20b0 [ 1223.137013] ? strncpy_from_user+0x9e/0x470 [ 1223.137527] ? finish_automount+0xa90/0xa90 [ 1223.138037] ? getname_flags.part.0+0x1dd/0x4f0 [ 1223.138597] __x64_sys_mount+0x282/0x300 [ 1223.139085] ? copy_mnt_ns+0xa00/0xa00 [ 1223.139558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.140176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.140791] do_syscall_64+0x33/0x40 [ 1223.141235] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.141846] RIP: 0033:0x7efe557f004a [ 1223.142285] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.144482] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.145383] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1223.146225] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.147072] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1223.147934] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.148775] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1223.149651] CPU: 0 PID: 9767 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1223.151121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.152797] Call Trace: [ 1223.153340] dump_stack+0x107/0x167 [ 1223.154081] should_fail.cold+0x5/0xa [ 1223.154848] ? create_object.isra.0+0x3a/0xa20 [ 1223.155785] should_failslab+0x5/0x20 [ 1223.156557] kmem_cache_alloc+0x5b/0x310 [ 1223.157382] create_object.isra.0+0x3a/0xa20 [ 1223.158264] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1223.159287] kmem_cache_alloc_trace+0x151/0x320 [ 1223.160239] alloc_fs_context+0x57/0x840 [ 1223.161068] path_mount+0x931/0x20b0 [ 1223.161822] ? strncpy_from_user+0x9e/0x470 [ 1223.162328] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.162688] ? finish_automount+0xa90/0xa90 [ 1223.162712] ? getname_flags.part.0+0x1dd/0x4f0 [ 1223.165200] __x64_sys_mount+0x282/0x300 [ 1223.166016] ? copy_mnt_ns+0xa00/0xa00 [ 1223.166801] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.167855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.168891] do_syscall_64+0x33/0x40 [ 1223.169637] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.170658] RIP: 0033:0x7f842a91904a [ 1223.171410] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.175075] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.176612] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1223.178037] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.179466] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1223.180891] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.182313] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 03:33:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) [ 1223.185833] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.186738] FAULT_INJECTION: forcing a failure. [ 1223.186738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1223.187978] FAULT_INJECTION: forcing a failure. [ 1223.187978] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1223.188993] CPU: 1 PID: 9768 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1223.192327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.193596] Call Trace: [ 1223.194007] dump_stack+0x107/0x167 [ 1223.194572] should_fail.cold+0x5/0xa [ 1223.195168] strncpy_from_user+0x34/0x470 [ 1223.195832] getname_flags.part.0+0x95/0x4f0 [ 1223.196515] getname_flags+0x9a/0xe0 [ 1223.197086] do_mkdirat+0x8f/0x2b0 [ 1223.197638] ? user_path_create+0xf0/0xf0 [ 1223.198266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.199070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.199878] do_syscall_64+0x33/0x40 [ 1223.200336] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.200902] RIP: 0033:0x7f05a88b1c27 [ 1223.201315] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.203354] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1223.204194] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b1c27 [ 1223.204997] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1223.205852] RBP: 00007f05a5e28040 R08: 0000000000000000 R09: 0000000002044034 [ 1223.206682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000280 [ 1223.207521] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1223.208388] CPU: 0 PID: 9770 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1223.209804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.211584] Call Trace: [ 1223.212118] dump_stack+0x107/0x167 [ 1223.212866] should_fail.cold+0x5/0xa [ 1223.213651] _copy_from_user+0x2e/0x1b0 [ 1223.214476] copy_mount_options+0x76/0x180 [ 1223.215347] __x64_sys_mount+0x1a8/0x300 [ 1223.216180] ? copy_mnt_ns+0xa00/0xa00 [ 1223.216989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.218060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.219130] do_syscall_64+0x33/0x40 [ 1223.219914] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.220966] RIP: 0033:0x7f101d10c04a [ 1223.221734] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.225466] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.226013] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.227036] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1223.227047] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.227058] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1223.227069] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.227087] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1223.240951] FAULT_INJECTION: forcing a failure. [ 1223.240951] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.241165] FAULT_INJECTION: forcing a failure. [ 1223.241165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1223.243275] CPU: 0 PID: 9769 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1223.246379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.248079] Call Trace: [ 1223.248615] dump_stack+0x107/0x167 [ 1223.249370] should_fail.cold+0x5/0xa [ 1223.250147] ? security_file_alloc+0x34/0x170 [ 1223.251070] should_failslab+0x5/0x20 [ 1223.251846] kmem_cache_alloc+0x5b/0x310 [ 1223.252688] security_file_alloc+0x34/0x170 [ 1223.253569] __alloc_file+0xb6/0x320 [ 1223.254343] alloc_empty_file+0x6d/0x170 [ 1223.255173] path_openat+0xe3/0x26f0 [ 1223.255965] ? path_lookupat+0x860/0x860 [ 1223.256802] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1223.257875] ? SOFTIRQ_verbose+0x10/0x10 [ 1223.258708] do_filp_open+0x190/0x3e0 [ 1223.259487] ? may_open_dev+0xf0/0xf0 [ 1223.260261] ? __alloc_fd+0x2b8/0x630 [ 1223.261040] ? lock_downgrade+0x6d0/0x6d0 [ 1223.261887] ? do_raw_spin_lock+0x121/0x260 [ 1223.262779] ? rwlock_bug.part.0+0x90/0x90 [ 1223.263662] ? _raw_spin_unlock+0x1a/0x30 [ 1223.264499] ? __alloc_fd+0x2b8/0x630 [ 1223.265281] do_sys_openat2+0x171/0x420 [ 1223.266080] ? __kasan_slab_free+0x122/0x160 [ 1223.266974] ? build_open_flags+0x6f0/0x6f0 [ 1223.267859] ? __x64_sys_mount+0x227/0x300 [ 1223.268713] ? kfree+0xd7/0x340 [ 1223.269384] __x64_sys_openat+0x13f/0x1f0 [ 1223.270219] ? __ia32_sys_open+0x1c0/0x1c0 [ 1223.271079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.272146] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.273186] do_syscall_64+0x33/0x40 [ 1223.273946] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.274979] RIP: 0033:0x7f82ca32ba04 [ 1223.275735] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1223.279424] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1223.280951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1223.282386] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1223.283842] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1223.285273] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1223.286705] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1223.288173] CPU: 1 PID: 9773 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1223.288948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.289126] FAULT_INJECTION: forcing a failure. [ 1223.289126] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.289883] Call Trace: [ 1223.289894] dump_stack+0x107/0x167 [ 1223.289906] should_fail.cold+0x5/0xa [ 1223.289920] _copy_from_user+0x2e/0x1b0 [ 1223.289939] copy_mount_options+0x76/0x180 [ 1223.294163] __x64_sys_mount+0x1a8/0x300 [ 1223.294621] ? copy_mnt_ns+0xa00/0xa00 [ 1223.295055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.295752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.296331] do_syscall_64+0x33/0x40 [ 1223.296751] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.297323] RIP: 0033:0x7ff72614904a [ 1223.297741] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.299793] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.300649] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1223.301449] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.302247] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1223.303042] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.303852] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1223.304669] CPU: 0 PID: 9772 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1223.306087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.306246] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.307770] Call Trace: [ 1223.307788] dump_stack+0x107/0x167 [ 1223.307810] should_fail.cold+0x5/0xa [ 1223.307830] ? copy_mount_options+0x55/0x180 [ 1223.307849] should_failslab+0x5/0x20 [ 1223.307866] kmem_cache_alloc_trace+0x55/0x320 [ 1223.307882] ? _copy_from_user+0xfb/0x1b0 [ 1223.307906] copy_mount_options+0x55/0x180 [ 1223.307929] __x64_sys_mount+0x1a8/0x300 [ 1223.307949] ? copy_mnt_ns+0xa00/0xa00 [ 1223.307971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.307988] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.308011] do_syscall_64+0x33/0x40 [ 1223.308031] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.308042] RIP: 0033:0x7fd4a117704a [ 1223.308060] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.308069] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.308088] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1223.308098] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.308108] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1223.308118] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.308128] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1223.328919] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.332257] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:33:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) 03:33:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) [ 1223.418220] FAULT_INJECTION: forcing a failure. [ 1223.418220] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.420667] CPU: 0 PID: 9777 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1223.422079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.423812] Call Trace: [ 1223.424371] dump_stack+0x107/0x167 [ 1223.425147] should_fail.cold+0x5/0xa [ 1223.425950] should_failslab+0x5/0x20 [ 1223.426723] __kmalloc_track_caller+0x79/0x370 [ 1223.427686] ? ext4_remount+0xdf/0x26e0 [ 1223.428508] kstrdup+0x36/0x70 [ 1223.429161] ? ext4_register_li_request+0x8e0/0x8e0 [ 1223.430178] ext4_remount+0xdf/0x26e0 [ 1223.430958] ? trace_hardirqs_on+0x5b/0x180 [ 1223.431874] ? ext4_register_li_request+0x8e0/0x8e0 [ 1223.432896] ? _cond_resched+0x12/0x80 [ 1223.433688] ? shrink_dentry_list+0x134/0x500 [ 1223.434599] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1223.435654] ? shrink_dcache_sb+0x1d5/0x220 [ 1223.436528] ? shrink_dentry_list+0x500/0x500 [ 1223.437451] ? ext4_register_li_request+0x8e0/0x8e0 [ 1223.438459] legacy_reconfigure+0x11b/0x190 [ 1223.439352] reconfigure_super+0x414/0x9c0 [ 1223.440214] ? fs_umode_to_dtype+0xb0/0xb0 [ 1223.441076] path_mount+0x1a75/0x20b0 [ 1223.441854] ? strncpy_from_user+0x9e/0x470 [ 1223.442732] ? finish_automount+0xa90/0xa90 [ 1223.443614] ? getname_flags.part.0+0x1dd/0x4f0 [ 1223.444574] __x64_sys_mount+0x282/0x300 [ 1223.445400] ? copy_mnt_ns+0xa00/0xa00 [ 1223.446194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.447250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.448303] do_syscall_64+0x33/0x40 [ 1223.449066] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.450102] RIP: 0033:0x7efe557f004a [ 1223.450853] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.454598] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.456154] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1223.457593] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.459026] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1223.460480] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.461911] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1223.607971] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1223.608758] FAULT_INJECTION: forcing a failure. [ 1223.608758] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.610034] CPU: 1 PID: 9781 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1223.610825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.611756] Call Trace: [ 1223.612063] dump_stack+0x107/0x167 [ 1223.612473] should_fail.cold+0x5/0xa [ 1223.612909] ? security_file_alloc+0x34/0x170 [ 1223.613468] should_failslab+0x5/0x20 [ 1223.613974] kmem_cache_alloc+0x5b/0x310 [ 1223.614436] security_file_alloc+0x34/0x170 [ 1223.614941] __alloc_file+0xb6/0x320 [ 1223.615505] alloc_empty_file+0x6d/0x170 [ 1223.616085] path_openat+0xe3/0x26f0 [ 1223.616508] ? path_lookupat+0x860/0x860 [ 1223.616965] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1223.617543] ? SOFTIRQ_verbose+0x10/0x10 [ 1223.618002] do_filp_open+0x190/0x3e0 [ 1223.618417] ? may_open_dev+0xf0/0xf0 [ 1223.618844] ? __alloc_fd+0x2b8/0x630 [ 1223.619265] ? lock_downgrade+0x6d0/0x6d0 [ 1223.619726] ? do_raw_spin_lock+0x121/0x260 [ 1223.620197] ? rwlock_bug.part.0+0x90/0x90 [ 1223.620669] ? _raw_spin_unlock+0x1a/0x30 [ 1223.621119] ? __alloc_fd+0x2b8/0x630 [ 1223.621548] do_sys_openat2+0x171/0x420 [ 1223.621975] ? __kasan_slab_free+0x122/0x160 [ 1223.622464] ? build_open_flags+0x6f0/0x6f0 [ 1223.622924] ? __x64_sys_mount+0x227/0x300 [ 1223.623407] ? kfree+0xd7/0x340 [ 1223.623764] __x64_sys_openat+0x13f/0x1f0 [ 1223.624218] ? __ia32_sys_open+0x1c0/0x1c0 [ 1223.624674] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.625249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.625801] do_syscall_64+0x33/0x40 [ 1223.626211] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.626752] RIP: 0033:0x7f82ca32ba04 [ 1223.627167] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1223.629146] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1223.629987] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1223.630762] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1223.631589] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1223.632376] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1223.633155] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1223.636335] FAULT_INJECTION: forcing a failure. [ 1223.636335] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.638859] CPU: 0 PID: 9782 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1223.640301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.642000] Call Trace: [ 1223.642549] dump_stack+0x107/0x167 [ 1223.643321] should_fail.cold+0x5/0xa [ 1223.644179] ? getname_flags.part.0+0x50/0x4f0 [ 1223.645126] should_failslab+0x5/0x20 [ 1223.645914] kmem_cache_alloc+0x5b/0x310 [ 1223.646751] getname_flags.part.0+0x50/0x4f0 [ 1223.647647] user_path_at_empty+0xa1/0x100 [ 1223.648505] __x64_sys_mount+0x1e9/0x300 [ 1223.649328] ? copy_mnt_ns+0xa00/0xa00 [ 1223.650121] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.651179] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.652239] do_syscall_64+0x33/0x40 [ 1223.652991] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1223.654018] RIP: 0033:0x7f101d10c04a [ 1223.654764] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.658464] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1223.660000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1223.661431] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1223.662872] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1223.664352] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1223.665786] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:33:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 4) 03:33:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) 03:33:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) 03:33:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) 03:33:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:33:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) 03:33:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) 03:33:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) [ 1237.048496] FAULT_INJECTION: forcing a failure. [ 1237.048496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1237.050422] CPU: 1 PID: 9794 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1237.051475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.052359] FAULT_INJECTION: forcing a failure. [ 1237.052359] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.052615] Call Trace: [ 1237.052638] dump_stack+0x107/0x167 [ 1237.055628] should_fail.cold+0x5/0xa [ 1237.056073] _copy_from_user+0x2e/0x1b0 [ 1237.056539] memdup_user+0x65/0xd0 [ 1237.056947] strndup_user+0x74/0xe0 [ 1237.057367] __x64_sys_mount+0x133/0x300 [ 1237.057842] ? copy_mnt_ns+0xa00/0xa00 [ 1237.058312] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.058942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.059584] do_syscall_64+0x33/0x40 [ 1237.060031] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.060661] RIP: 0033:0x7f18473bf04a [ 1237.061114] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.063324] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.064246] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1237.065092] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.065935] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1237.066782] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.067642] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1237.068515] CPU: 0 PID: 9796 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1237.069911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.071701] Call Trace: [ 1237.072247] dump_stack+0x107/0x167 [ 1237.073029] should_fail.cold+0x5/0xa [ 1237.073869] ? getname_flags.part.0+0x50/0x4f0 [ 1237.074805] should_failslab+0x5/0x20 [ 1237.075600] kmem_cache_alloc+0x5b/0x310 [ 1237.076428] getname_flags.part.0+0x50/0x4f0 [ 1237.077329] user_path_at_empty+0xa1/0x100 [ 1237.078193] __x64_sys_mount+0x1e9/0x300 [ 1237.079019] ? copy_mnt_ns+0xa00/0xa00 [ 1237.079871] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.080937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.081995] do_syscall_64+0x33/0x40 [ 1237.082759] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.083820] RIP: 0033:0x7ff72614904a [ 1237.084577] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.088339] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.089885] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1237.091323] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.092793] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1237.094253] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.095709] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:33:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) [ 1237.100337] FAULT_INJECTION: forcing a failure. [ 1237.100337] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.102178] CPU: 1 PID: 9795 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1237.102195] FAULT_INJECTION: forcing a failure. [ 1237.102195] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.104933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.106192] Call Trace: [ 1237.106599] dump_stack+0x107/0x167 [ 1237.107198] should_fail.cold+0x5/0xa [ 1237.107841] should_failslab+0x5/0x20 [ 1237.108471] __kmalloc_track_caller+0x79/0x370 [ 1237.109207] ? strndup_user+0x74/0xe0 [ 1237.109794] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.110516] memdup_user+0x22/0xd0 [ 1237.111070] strndup_user+0x74/0xe0 [ 1237.111649] __x64_sys_mount+0x133/0x300 [ 1237.112274] ? copy_mnt_ns+0xa00/0xa00 [ 1237.112744] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.113355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.113972] do_syscall_64+0x33/0x40 [ 1237.114420] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.115023] RIP: 0033:0x7f05a88b404a [ 1237.115472] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.117686] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.118581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1237.119421] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.120270] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1237.121110] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.121956] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1237.122829] CPU: 0 PID: 9798 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1237.124246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.125934] Call Trace: [ 1237.126470] dump_stack+0x107/0x167 [ 1237.127215] should_fail.cold+0x5/0xa [ 1237.128008] ? create_object.isra.0+0x3a/0xa20 [ 1237.128938] should_failslab+0x5/0x20 [ 1237.129711] kmem_cache_alloc+0x5b/0x310 [ 1237.130540] create_object.isra.0+0x3a/0xa20 [ 1237.131434] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.132483] kmem_cache_alloc_trace+0x151/0x320 [ 1237.133437] copy_mount_options+0x55/0x180 [ 1237.134304] __x64_sys_mount+0x1a8/0x300 [ 1237.135142] ? copy_mnt_ns+0xa00/0xa00 [ 1237.135950] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.137030] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.138081] do_syscall_64+0x33/0x40 [ 1237.138843] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.139890] RIP: 0033:0x7fd4a117704a [ 1237.140648] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.144405] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.145944] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1237.147406] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.148875] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1237.150334] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.151784] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1237.159000] FAULT_INJECTION: forcing a failure. [ 1237.159000] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.161403] CPU: 0 PID: 9797 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1237.162862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.164570] Call Trace: [ 1237.165105] dump_stack+0x107/0x167 [ 1237.165862] should_fail.cold+0x5/0xa [ 1237.166639] ? create_object.isra.0+0x3a/0xa20 [ 1237.167576] should_failslab+0x5/0x20 [ 1237.168356] kmem_cache_alloc+0x5b/0x310 [ 1237.169195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.170263] create_object.isra.0+0x3a/0xa20 [ 1237.171159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.172200] kmem_cache_alloc+0x159/0x310 [ 1237.173047] getname_flags.part.0+0x50/0x4f0 [ 1237.173943] user_path_at_empty+0xa1/0x100 [ 1237.174807] __x64_sys_mount+0x1e9/0x300 [ 1237.175655] ? copy_mnt_ns+0xa00/0xa00 [ 1237.176450] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.177513] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.177586] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.178575] do_syscall_64+0x33/0x40 [ 1237.178599] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.179442] FAULT_INJECTION: forcing a failure. [ 1237.179442] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.180035] RIP: 0033:0x7f101d10c04a [ 1237.180053] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.180067] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.188983] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1237.190439] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.191911] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1237.193356] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.194822] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1237.196310] CPU: 1 PID: 9799 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1237.197097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.198008] Call Trace: [ 1237.198301] dump_stack+0x107/0x167 [ 1237.198714] should_fail.cold+0x5/0xa [ 1237.199138] ? security_file_alloc+0x34/0x170 [ 1237.199661] should_failslab+0x5/0x20 [ 1237.200113] kmem_cache_alloc+0x5b/0x310 [ 1237.200589] security_file_alloc+0x34/0x170 [ 1237.201104] __alloc_file+0xb6/0x320 [ 1237.201553] alloc_empty_file+0x6d/0x170 [ 1237.202028] path_openat+0xe3/0x26f0 [ 1237.202470] ? path_lookupat+0x860/0x860 [ 1237.202947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.203561] ? SOFTIRQ_verbose+0x10/0x10 [ 1237.204044] do_filp_open+0x190/0x3e0 [ 1237.204491] ? may_open_dev+0xf0/0xf0 [ 1237.204929] ? __alloc_fd+0x2b8/0x630 [ 1237.205375] ? lock_downgrade+0x6d0/0x6d0 [ 1237.205854] ? do_raw_spin_lock+0x121/0x260 [ 1237.206356] ? rwlock_bug.part.0+0x90/0x90 [ 1237.206855] ? _raw_spin_unlock+0x1a/0x30 [ 1237.207330] ? __alloc_fd+0x2b8/0x630 [ 1237.207782] do_sys_openat2+0x171/0x420 [ 1237.208234] ? __kasan_slab_free+0x122/0x160 [ 1237.208736] ? build_open_flags+0x6f0/0x6f0 [ 1237.209232] ? __x64_sys_mount+0x227/0x300 [ 1237.209719] ? kfree+0xd7/0x340 [ 1237.210099] __x64_sys_openat+0x13f/0x1f0 [ 1237.210574] ? __ia32_sys_open+0x1c0/0x1c0 [ 1237.211064] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.211679] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.212261] do_syscall_64+0x33/0x40 [ 1237.212695] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.213282] RIP: 0033:0x7f82ca32ba04 [ 1237.213716] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1237.215840] RSP: 002b:00007f82c78edf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1237.216699] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f82ca32ba04 [ 1237.217505] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1237.218334] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1237.219156] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1237.219970] R13: 0000000020000080 R14: 00007f82c78ee000 R15: 0000000020000180 [ 1237.227284] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:33:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) [ 1237.232624] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.237579] FAULT_INJECTION: forcing a failure. [ 1237.237579] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.238849] CPU: 1 PID: 9803 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1237.239611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.240523] Call Trace: [ 1237.240820] dump_stack+0x107/0x167 [ 1237.241234] should_fail.cold+0x5/0xa [ 1237.241661] ? create_object.isra.0+0x3a/0xa20 [ 1237.242169] should_failslab+0x5/0x20 [ 1237.242593] kmem_cache_alloc+0x5b/0x310 [ 1237.243041] create_object.isra.0+0x3a/0xa20 [ 1237.243547] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.244112] __kmalloc_track_caller+0x177/0x370 [ 1237.244622] ? ext4_remount+0xdf/0x26e0 [ 1237.245069] kstrdup+0x36/0x70 [ 1237.245420] ? ext4_register_li_request+0x8e0/0x8e0 [ 1237.245964] ext4_remount+0xdf/0x26e0 [ 1237.246383] ? shrink_dentry_list+0x28d/0x500 [ 1237.246874] ? lock_downgrade+0x6d0/0x6d0 [ 1237.247334] ? lock_downgrade+0x6d0/0x6d0 [ 1237.247807] ? do_raw_spin_lock+0x121/0x260 [ 1237.248283] ? rwlock_bug.part.0+0x90/0x90 [ 1237.248754] ? ext4_register_li_request+0x8e0/0x8e0 [ 1237.249319] ? do_raw_spin_unlock+0x4f/0x220 [ 1237.249823] ? _raw_spin_unlock+0x1a/0x30 [ 1237.250298] ? shrink_dentry_list+0x134/0x500 [ 1237.250816] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1237.251406] ? shrink_dcache_sb+0x1d5/0x220 [ 1237.251915] ? shrink_dentry_list+0x500/0x500 [ 1237.252420] ? ext4_register_li_request+0x8e0/0x8e0 [ 1237.252999] legacy_reconfigure+0x11b/0x190 [ 1237.253480] reconfigure_super+0x414/0x9c0 [ 1237.253965] ? fs_umode_to_dtype+0xb0/0xb0 [ 1237.254447] path_mount+0x1a75/0x20b0 [ 1237.254887] ? strncpy_from_user+0x9e/0x470 [ 1237.255371] ? finish_automount+0xa90/0xa90 [ 1237.255872] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.256414] __x64_sys_mount+0x282/0x300 [ 1237.256881] ? copy_mnt_ns+0xa00/0xa00 [ 1237.257315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.257916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.258504] do_syscall_64+0x33/0x40 [ 1237.258934] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.259514] RIP: 0033:0x7efe557f004a [ 1237.259959] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.262046] RSP: 002b:00007efe52d42fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1237.262909] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1237.263712] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.264507] RBP: 00007efe52d43040 R08: 00007efe52d43040 R09: 0000000020000280 [ 1237.265308] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1237.266126] R13: 0000000020000080 R14: 00007efe52d43000 R15: 0000000020000180 03:33:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) [ 1237.269841] FAULT_INJECTION: forcing a failure. [ 1237.269841] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.271155] CPU: 1 PID: 9802 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1237.271934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.272873] Call Trace: [ 1237.273180] dump_stack+0x107/0x167 [ 1237.273611] should_fail.cold+0x5/0xa [ 1237.274069] ? legacy_init_fs_context+0x44/0xe0 [ 1237.274614] should_failslab+0x5/0x20 [ 1237.275044] kmem_cache_alloc_trace+0x55/0x320 [ 1237.275561] ? lockdep_init_map_type+0x2c7/0x780 [ 1237.276111] legacy_init_fs_context+0x44/0xe0 [ 1237.276625] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1237.277195] alloc_fs_context+0x4fd/0x840 [ 1237.277673] path_mount+0x931/0x20b0 [ 1237.278101] ? strncpy_from_user+0x9e/0x470 [ 1237.278590] ? finish_automount+0xa90/0xa90 [ 1237.279080] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.279648] __x64_sys_mount+0x282/0x300 [ 1237.280101] ? copy_mnt_ns+0xa00/0xa00 [ 1237.280544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.281125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.281704] do_syscall_64+0x33/0x40 [ 1237.282122] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.282691] RIP: 0033:0x7f842a91904a [ 1237.283115] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.285191] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.286025] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1237.286834] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.286850] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.288305] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1237.289101] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.289882] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 03:33:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 29) 03:33:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:33:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 5) 03:33:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) 03:33:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) [ 1237.464213] FAULT_INJECTION: forcing a failure. [ 1237.464213] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.466568] CPU: 0 PID: 9807 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1237.468001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.469710] Call Trace: [ 1237.470260] dump_stack+0x107/0x167 [ 1237.471032] should_fail.cold+0x5/0xa [ 1237.471834] ? copy_mount_options+0x55/0x180 [ 1237.472741] should_failslab+0x5/0x20 [ 1237.473530] kmem_cache_alloc_trace+0x55/0x320 [ 1237.474467] ? _copy_from_user+0xfb/0x1b0 [ 1237.475327] copy_mount_options+0x55/0x180 [ 1237.476215] __x64_sys_mount+0x1a8/0x300 [ 1237.477042] ? copy_mnt_ns+0xa00/0xa00 [ 1237.477841] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.478904] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.479965] do_syscall_64+0x33/0x40 [ 1237.480728] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.481768] RIP: 0033:0x7f18473bf04a [ 1237.482525] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.486272] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.487836] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1237.489280] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.490728] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1237.492180] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.493646] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1237.500225] FAULT_INJECTION: forcing a failure. [ 1237.500225] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.502645] CPU: 0 PID: 9810 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1237.504082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.505788] Call Trace: [ 1237.506330] dump_stack+0x107/0x167 [ 1237.507089] should_fail.cold+0x5/0xa [ 1237.507893] ? create_object.isra.0+0x3a/0xa20 [ 1237.508858] should_failslab+0x5/0x20 [ 1237.509640] kmem_cache_alloc+0x5b/0x310 [ 1237.510479] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.511582] create_object.isra.0+0x3a/0xa20 [ 1237.512485] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.513528] kmem_cache_alloc+0x159/0x310 [ 1237.514389] getname_flags.part.0+0x50/0x4f0 [ 1237.515298] user_path_at_empty+0xa1/0x100 [ 1237.516188] __x64_sys_mount+0x1e9/0x300 [ 1237.517027] ? copy_mnt_ns+0xa00/0xa00 [ 1237.517827] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.518897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.519970] do_syscall_64+0x33/0x40 [ 1237.520734] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.521781] RIP: 0033:0x7ff72614904a [ 1237.522545] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.526310] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.527870] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1237.529318] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.530767] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1237.532220] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.533672] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1237.558327] FAULT_INJECTION: forcing a failure. [ 1237.558327] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.559614] CPU: 1 PID: 9816 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1237.560354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.561255] Call Trace: [ 1237.561507] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.561550] dump_stack+0x107/0x167 [ 1237.563131] should_fail.cold+0x5/0xa [ 1237.563558] ? create_object.isra.0+0x3a/0xa20 [ 1237.564063] should_failslab+0x5/0x20 [ 1237.564488] kmem_cache_alloc+0x5b/0x310 [ 1237.564928] create_object.isra.0+0x3a/0xa20 [ 1237.565417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.565976] __kmalloc_track_caller+0x177/0x370 [ 1237.566489] ? strndup_user+0x74/0xe0 [ 1237.566898] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.567402] memdup_user+0x22/0xd0 [ 1237.567806] strndup_user+0x74/0xe0 [ 1237.568198] __x64_sys_mount+0x133/0x300 [ 1237.568656] ? copy_mnt_ns+0xa00/0xa00 [ 1237.569080] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.569674] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.570242] do_syscall_64+0x33/0x40 [ 1237.570659] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.571221] RIP: 0033:0x7f05a88b404a [ 1237.571648] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.573695] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.574531] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1237.575308] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.576106] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1237.576888] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.577665] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1237.581420] FAULT_INJECTION: forcing a failure. [ 1237.581420] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.583726] CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1237.585122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.586808] Call Trace: [ 1237.587368] dump_stack+0x107/0x167 [ 1237.588188] should_fail.cold+0x5/0xa [ 1237.588998] ? legacy_init_fs_context+0x44/0xe0 [ 1237.589966] should_failslab+0x5/0x20 [ 1237.590755] kmem_cache_alloc_trace+0x55/0x320 [ 1237.591718] ? lockdep_init_map_type+0x2c7/0x780 [ 1237.592702] legacy_init_fs_context+0x44/0xe0 [ 1237.593611] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1237.594374] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.594635] alloc_fs_context+0x4fd/0x840 [ 1237.596132] path_mount+0x931/0x20b0 [ 1237.596898] ? strncpy_from_user+0x9e/0x470 [ 1237.597780] ? finish_automount+0xa90/0xa90 [ 1237.598657] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.599632] __x64_sys_mount+0x282/0x300 [ 1237.600460] ? copy_mnt_ns+0xa00/0xa00 [ 1237.601258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.602314] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.603366] do_syscall_64+0x33/0x40 [ 1237.604134] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.605191] RIP: 0033:0x7f842a91904a [ 1237.605950] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.609698] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.611234] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a 03:33:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 6) [ 1237.612693] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.614295] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1237.615744] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.617185] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1237.623482] FAULT_INJECTION: forcing a failure. [ 1237.623482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1237.626095] CPU: 0 PID: 9817 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1237.627565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.629250] Call Trace: [ 1237.629785] dump_stack+0x107/0x167 [ 1237.630547] should_fail.cold+0x5/0xa [ 1237.631356] _copy_from_user+0x2e/0x1b0 [ 1237.632191] copy_mount_options+0x76/0x180 [ 1237.633070] __x64_sys_mount+0x1a8/0x300 [ 1237.633906] ? copy_mnt_ns+0xa00/0xa00 [ 1237.634706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.635790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.636846] do_syscall_64+0x33/0x40 [ 1237.637608] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.638648] RIP: 0033:0x7fd4a117704a [ 1237.639411] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.643145] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.644684] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1237.646127] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.647761] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 03:33:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) [ 1237.649200] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.650745] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 03:33:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) [ 1237.660557] FAULT_INJECTION: forcing a failure. [ 1237.660557] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.662984] CPU: 0 PID: 9818 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1237.664408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.666097] Call Trace: [ 1237.666645] dump_stack+0x107/0x167 [ 1237.667404] should_fail.cold+0x5/0xa [ 1237.668216] ? create_object.isra.0+0x3a/0xa20 [ 1237.669169] should_failslab+0x5/0x20 [ 1237.669955] kmem_cache_alloc+0x5b/0x310 [ 1237.670788] create_object.isra.0+0x3a/0xa20 [ 1237.671699] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.672742] __kmalloc_track_caller+0x177/0x370 [ 1237.673695] ? ext4_remount+0xdf/0x26e0 [ 1237.674522] kstrdup+0x36/0x70 [ 1237.675180] ? ext4_register_li_request+0x8e0/0x8e0 [ 1237.676227] ext4_remount+0xdf/0x26e0 [ 1237.677011] ? shrink_dentry_list+0x28d/0x500 [ 1237.677948] ? lock_downgrade+0x6d0/0x6d0 [ 1237.678789] ? lock_downgrade+0x6d0/0x6d0 [ 1237.679651] ? do_raw_spin_lock+0x121/0x260 [ 1237.680530] ? rwlock_bug.part.0+0x90/0x90 [ 1237.681403] ? ext4_register_li_request+0x8e0/0x8e0 03:33:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) [ 1237.682415] ? do_raw_spin_unlock+0x4f/0x220 [ 1237.683464] ? _raw_spin_unlock+0x1a/0x30 [ 1237.684363] ? shrink_dentry_list+0x134/0x500 [ 1237.685289] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1237.686360] ? shrink_dcache_sb+0x1d5/0x220 [ 1237.687235] ? shrink_dentry_list+0x500/0x500 [ 1237.688162] ? ext4_register_li_request+0x8e0/0x8e0 [ 1237.689179] legacy_reconfigure+0x11b/0x190 [ 1237.690058] reconfigure_super+0x414/0x9c0 [ 1237.690919] ? fs_umode_to_dtype+0xb0/0xb0 [ 1237.691826] path_mount+0x1a75/0x20b0 [ 1237.692603] ? strncpy_from_user+0x9e/0x470 [ 1237.693479] ? finish_automount+0xa90/0xa90 [ 1237.694345] ? getname_flags.part.0+0x1dd/0x4f0 [ 1237.695302] __x64_sys_mount+0x282/0x300 [ 1237.696136] ? copy_mnt_ns+0xa00/0xa00 [ 1237.696932] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.697994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.699044] do_syscall_64+0x33/0x40 [ 1237.699823] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.700857] RIP: 0033:0x7efe557f004a [ 1237.701611] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.705365] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.706913] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1237.708360] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.709806] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1237.711253] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.712708] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1237.714898] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.716281] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.738857] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1237.740296] FAULT_INJECTION: forcing a failure. [ 1237.740296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1237.743655] CPU: 0 PID: 9821 Comm: syz-executor.7 Not tainted 5.10.202 #1 [ 1237.745302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.747320] Call Trace: [ 1237.747966] dump_stack+0x107/0x167 [ 1237.748862] should_fail.cold+0x5/0xa [ 1237.749787] _copy_to_user+0x2e/0x180 [ 1237.750725] simple_read_from_buffer+0xcc/0x160 [ 1237.751877] proc_fail_nth_read+0x198/0x230 [ 1237.752847] ? proc_sessionid_read+0x230/0x230 [ 1237.753771] ? security_file_permission+0x24e/0x570 [ 1237.754787] ? perf_trace_initcall_start+0x101/0x380 [ 1237.755831] ? proc_sessionid_read+0x230/0x230 [ 1237.756758] vfs_read+0x228/0x580 [ 1237.757476] ksys_read+0x12d/0x260 [ 1237.758207] ? vfs_write+0xa70/0xa70 [ 1237.758969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.760041] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.761103] do_syscall_64+0x33/0x40 [ 1237.761859] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.762898] RIP: 0033:0x7f82ca32b69c [ 1237.763659] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1237.767387] RSP: 002b:00007f82c78ee170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1237.768948] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f82ca32b69c [ 1237.770392] RDX: 000000000000000f RSI: 00007f82c78ee1e0 RDI: 0000000000000003 03:33:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) [ 1237.771897] RBP: 00007f82c78ee1d0 R08: 0000000000000000 R09: 0000000020000280 [ 1237.773487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1237.774940] R13: 00007ffc71269f2f R14: 00007f82c78ee300 R15: 0000000000022000 03:33:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) [ 1237.796416] FAULT_INJECTION: forcing a failure. [ 1237.796416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1237.799051] CPU: 0 PID: 9822 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1237.800484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.802179] Call Trace: [ 1237.802719] dump_stack+0x107/0x167 [ 1237.803476] should_fail.cold+0x5/0xa [ 1237.804356] strncpy_from_user+0x34/0x470 [ 1237.805230] getname_flags.part.0+0x95/0x4f0 [ 1237.806138] user_path_at_empty+0xa1/0x100 [ 1237.807006] __x64_sys_mount+0x1e9/0x300 [ 1237.807858] ? copy_mnt_ns+0xa00/0xa00 [ 1237.808654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.809715] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.810767] do_syscall_64+0x33/0x40 [ 1237.811537] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1237.812575] RIP: 0033:0x7f101d10c04a [ 1237.813331] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.817053] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1237.818613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1237.820074] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1237.821515] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1237.822954] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1237.824401] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:33:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1238.020917] FAULT_INJECTION: forcing a failure. [ 1238.020917] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.023600] CPU: 0 PID: 9829 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1238.024999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.026691] Call Trace: [ 1238.027233] dump_stack+0x107/0x167 [ 1238.027993] should_fail.cold+0x5/0xa [ 1238.028777] ? create_object.isra.0+0x3a/0xa20 [ 1238.029706] should_failslab+0x5/0x20 [ 1238.030480] kmem_cache_alloc+0x5b/0x310 [ 1238.031309] create_object.isra.0+0x3a/0xa20 [ 1238.032221] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1238.033254] __kmalloc_track_caller+0x177/0x370 [ 1238.034205] ? strndup_user+0x74/0xe0 [ 1238.034977] ? getname_flags.part.0+0x1dd/0x4f0 [ 1238.035949] memdup_user+0x22/0xd0 [ 1238.036677] strndup_user+0x74/0xe0 [ 1238.037428] __x64_sys_mount+0x133/0x300 [ 1238.038269] ? copy_mnt_ns+0xa00/0xa00 [ 1238.039071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.040141] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.041203] do_syscall_64+0x33/0x40 [ 1238.041963] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.043015] RIP: 0033:0x7f05a88b404a [ 1238.043790] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.047560] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.049106] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1238.050542] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.052001] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1238.053444] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.054889] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1238.066335] FAULT_INJECTION: forcing a failure. [ 1238.066335] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.068781] CPU: 0 PID: 9830 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1238.070187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.071899] Call Trace: [ 1238.072438] dump_stack+0x107/0x167 [ 1238.073202] should_fail.cold+0x5/0xa [ 1238.073985] ? create_object.isra.0+0x3a/0xa20 [ 1238.074926] should_failslab+0x5/0x20 [ 1238.075718] kmem_cache_alloc+0x5b/0x310 [ 1238.076558] create_object.isra.0+0x3a/0xa20 [ 1238.077478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1238.078527] kmem_cache_alloc_trace+0x151/0x320 [ 1238.079496] copy_mount_options+0x55/0x180 [ 1238.080390] __x64_sys_mount+0x1a8/0x300 [ 1238.081247] ? copy_mnt_ns+0xa00/0xa00 [ 1238.082051] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.083124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.084205] do_syscall_64+0x33/0x40 [ 1238.084972] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.086013] RIP: 0033:0x7f18473bf04a [ 1238.086769] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.090508] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.092074] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1238.093526] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.094981] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1238.096432] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.097885] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1238.108843] FAULT_INJECTION: forcing a failure. [ 1238.108843] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.111184] CPU: 1 PID: 9833 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1238.112645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.114345] Call Trace: [ 1238.114898] dump_stack+0x107/0x167 [ 1238.115667] should_fail.cold+0x5/0xa [ 1238.116464] should_failslab+0x5/0x20 [ 1238.117259] __kmalloc_track_caller+0x79/0x370 [ 1238.118192] ? ext4_remount+0xdf/0x26e0 [ 1238.119025] kstrdup+0x36/0x70 [ 1238.119711] ? ext4_register_li_request+0x8e0/0x8e0 [ 1238.120726] ext4_remount+0xdf/0x26e0 [ 1238.121510] ? trace_hardirqs_on+0x5b/0x180 [ 1238.122411] ? ext4_register_li_request+0x8e0/0x8e0 [ 1238.123433] ? _cond_resched+0x12/0x80 [ 1238.124239] ? shrink_dentry_list+0x134/0x500 [ 1238.125158] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1238.126220] ? shrink_dcache_sb+0x1d5/0x220 [ 1238.127102] ? shrink_dentry_list+0x500/0x500 [ 1238.128043] ? ext4_register_li_request+0x8e0/0x8e0 [ 1238.129065] legacy_reconfigure+0x11b/0x190 [ 1238.129948] reconfigure_super+0x414/0x9c0 [ 1238.130818] ? fs_umode_to_dtype+0xb0/0xb0 [ 1238.131694] path_mount+0x1a75/0x20b0 [ 1238.132481] ? strncpy_from_user+0x9e/0x470 [ 1238.133375] ? finish_automount+0xa90/0xa90 [ 1238.134262] ? getname_flags.part.0+0x1dd/0x4f0 [ 1238.135245] __x64_sys_mount+0x282/0x300 [ 1238.136085] ? copy_mnt_ns+0xa00/0xa00 [ 1238.136901] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.137984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.139056] do_syscall_64+0x33/0x40 [ 1238.139841] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.140893] RIP: 0033:0x7f842a91904a [ 1238.141666] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.145428] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.146980] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1238.148443] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.149894] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1238.151348] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.152465] FAULT_INJECTION: forcing a failure. [ 1238.152465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1238.152810] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1238.158108] CPU: 0 PID: 9832 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1238.159582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.161270] Call Trace: [ 1238.161811] dump_stack+0x107/0x167 [ 1238.162557] should_fail.cold+0x5/0xa [ 1238.163343] strncpy_from_user+0x34/0x470 [ 1238.164209] getname_flags.part.0+0x95/0x4f0 [ 1238.165116] user_path_at_empty+0xa1/0x100 [ 1238.165986] __x64_sys_mount+0x1e9/0x300 [ 1238.166823] ? copy_mnt_ns+0xa00/0xa00 [ 1238.167630] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.168701] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.169748] do_syscall_64+0x33/0x40 [ 1238.170505] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.171563] RIP: 0033:0x7ff72614904a [ 1238.172321] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.176060] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.177610] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1238.179059] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.180514] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1238.181957] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.183403] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1238.185250] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1238.188698] FAULT_INJECTION: forcing a failure. [ 1238.188698] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.191159] CPU: 0 PID: 9834 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1238.192707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.194415] Call Trace: [ 1238.194959] dump_stack+0x107/0x167 [ 1238.195724] should_fail.cold+0x5/0xa [ 1238.196507] ? getname_flags.part.0+0x50/0x4f0 [ 1238.197445] should_failslab+0x5/0x20 [ 1238.198234] kmem_cache_alloc+0x5b/0x310 [ 1238.199067] getname_flags.part.0+0x50/0x4f0 [ 1238.199981] user_path_at_empty+0xa1/0x100 [ 1238.200847] __x64_sys_mount+0x1e9/0x300 [ 1238.201677] ? copy_mnt_ns+0xa00/0xa00 [ 1238.202470] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.203556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.204619] do_syscall_64+0x33/0x40 [ 1238.205380] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.206422] RIP: 0033:0x7fd4a117704a [ 1238.207190] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.210981] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.212528] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1238.213970] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.215412] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1238.216870] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.218309] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1238.284751] FAULT_INJECTION: forcing a failure. [ 1238.284751] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.287304] CPU: 0 PID: 9835 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1238.288797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.290476] Call Trace: [ 1238.291016] dump_stack+0x107/0x167 [ 1238.291777] should_fail.cold+0x5/0xa [ 1238.292553] ? create_object.isra.0+0x3a/0xa20 [ 1238.293500] should_failslab+0x5/0x20 [ 1238.294272] kmem_cache_alloc+0x5b/0x310 [ 1238.295105] ? mark_held_locks+0x9e/0xe0 [ 1238.295942] create_object.isra.0+0x3a/0xa20 [ 1238.296849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1238.297884] __kmalloc_track_caller+0x177/0x370 [ 1238.298842] ? ext4_remount+0x39c/0x26e0 [ 1238.299694] kstrdup+0x36/0x70 [ 1238.300364] ext4_remount+0x39c/0x26e0 [ 1238.301181] ? ext4_register_li_request+0x8e0/0x8e0 [ 1238.302201] ? do_raw_spin_unlock+0x4f/0x220 [ 1238.303101] ? _raw_spin_unlock+0x1a/0x30 [ 1238.303954] ? shrink_dentry_list+0x16/0x500 [ 1238.304854] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1238.305933] ? shrink_dentry_list+0x500/0x500 [ 1238.306854] ? ext4_register_li_request+0x8e0/0x8e0 [ 1238.307876] legacy_reconfigure+0x11b/0x190 [ 1238.308760] reconfigure_super+0x414/0x9c0 [ 1238.309624] ? fs_umode_to_dtype+0xb0/0xb0 [ 1238.310489] path_mount+0x1a75/0x20b0 [ 1238.311265] ? strncpy_from_user+0x9e/0x470 [ 1238.312160] ? finish_automount+0xa90/0xa90 [ 1238.313041] ? getname_flags.part.0+0x1dd/0x4f0 [ 1238.313998] __x64_sys_mount+0x282/0x300 [ 1238.314823] ? copy_mnt_ns+0xa00/0xa00 [ 1238.315621] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.316682] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.317730] do_syscall_64+0x33/0x40 [ 1238.318491] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1238.319527] RIP: 0033:0x7efe557f004a [ 1238.320310] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.324038] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1238.325599] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1238.327051] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1238.328511] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1238.329957] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1238.331405] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:33:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:33:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:33:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) 03:33:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) 03:33:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:33:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 7) 03:33:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:33:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) [ 1253.373991] EXT4-fs: 3 callbacks suppressed [ 1253.374008] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.380954] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.387712] FAULT_INJECTION: forcing a failure. [ 1253.387712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1253.388321] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.390114] CPU: 1 PID: 9849 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1253.390126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.390142] Call Trace: [ 1253.394080] FAULT_INJECTION: forcing a failure. [ 1253.394080] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.394615] dump_stack+0x107/0x167 [ 1253.394642] should_fail.cold+0x5/0xa [ 1253.399072] _copy_from_user+0x2e/0x1b0 [ 1253.399926] copy_mount_options+0x76/0x180 [ 1253.400810] __x64_sys_mount+0x1a8/0x300 [ 1253.401659] ? copy_mnt_ns+0xa00/0xa00 [ 1253.402475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.403534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.404604] do_syscall_64+0x33/0x40 [ 1253.405358] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.406416] RIP: 0033:0x7f18473bf04a [ 1253.407174] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.410919] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.412461] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1253.413889] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.415311] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1253.416752] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.418175] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1253.419636] CPU: 0 PID: 9848 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1253.421045] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.422729] Call Trace: [ 1253.423276] dump_stack+0x107/0x167 [ 1253.424033] should_fail.cold+0x5/0xa [ 1253.424817] ? getname_flags.part.0+0x50/0x4f0 [ 1253.425751] should_failslab+0x5/0x20 [ 1253.426529] kmem_cache_alloc+0x5b/0x310 [ 1253.427365] ? lock_downgrade+0x6d0/0x6d0 [ 1253.428298] getname_flags.part.0+0x50/0x4f0 [ 1253.429238] getname+0x8e/0xd0 [ 1253.429899] do_sys_openat2+0xf9/0x420 [ 1253.430691] ? __kasan_slab_free+0x122/0x160 [ 1253.431590] ? build_open_flags+0x6f0/0x6f0 [ 1253.432490] ? __x64_sys_mount+0x227/0x300 [ 1253.433373] __x64_sys_openat+0x13f/0x1f0 [ 1253.434217] ? __ia32_sys_open+0x1c0/0x1c0 [ 1253.435090] ? __ia32_sys_open+0x1c0/0x1c0 [ 1253.435985] do_syscall_64+0x33/0x40 [ 1253.436752] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.437795] RIP: 0033:0x7efe557a1a04 [ 1253.438557] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1253.442278] RSP: 002b:00007efe52d63f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1253.443825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1253.445279] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1253.446721] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1253.448183] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1253.449120] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.449629] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1253.454868] FAULT_INJECTION: forcing a failure. [ 1253.454868] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.457176] CPU: 1 PID: 9851 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1253.458558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.460248] Call Trace: [ 1253.460795] dump_stack+0x107/0x167 [ 1253.461551] should_fail.cold+0x5/0xa [ 1253.462342] ? create_object.isra.0+0x3a/0xa20 [ 1253.463279] should_failslab+0x5/0x20 [ 1253.464074] kmem_cache_alloc+0x5b/0x310 [ 1253.464900] create_object.isra.0+0x3a/0xa20 [ 1253.465784] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1253.466813] __kmalloc_track_caller+0x177/0x370 [ 1253.467755] ? ext4_remount+0xdf/0x26e0 [ 1253.468565] kstrdup+0x36/0x70 [ 1253.469217] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.470218] ext4_remount+0xdf/0x26e0 [ 1253.470999] ? shrink_dentry_list+0x28d/0x500 [ 1253.471905] ? lock_downgrade+0x6d0/0x6d0 [ 1253.472737] ? lock_downgrade+0x6d0/0x6d0 [ 1253.473594] ? do_raw_spin_lock+0x121/0x260 [ 1253.474467] ? rwlock_bug.part.0+0x90/0x90 [ 1253.475328] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.476357] ? do_raw_spin_unlock+0x4f/0x220 [ 1253.477244] ? _raw_spin_unlock+0x1a/0x30 [ 1253.478078] ? shrink_dentry_list+0x134/0x500 [ 1253.478980] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1253.480033] ? shrink_dcache_sb+0x1d5/0x220 [ 1253.480903] ? shrink_dentry_list+0x500/0x500 [ 1253.481824] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.482826] legacy_reconfigure+0x11b/0x190 [ 1253.483692] reconfigure_super+0x414/0x9c0 [ 1253.484568] ? fs_umode_to_dtype+0xb0/0xb0 [ 1253.485431] path_mount+0x1a75/0x20b0 [ 1253.486202] ? strncpy_from_user+0x9e/0x470 [ 1253.487075] ? finish_automount+0xa90/0xa90 [ 1253.487951] ? getname_flags.part.0+0x1dd/0x4f0 [ 1253.488905] __x64_sys_mount+0x282/0x300 [ 1253.489723] ? copy_mnt_ns+0xa00/0xa00 [ 1253.490509] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.491559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.491906] FAULT_INJECTION: forcing a failure. [ 1253.491906] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.492608] do_syscall_64+0x33/0x40 [ 1253.495553] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.496596] RIP: 0033:0x7f842a91904a [ 1253.497342] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.501065] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.502594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1253.504031] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.505460] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1253.506888] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.508329] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1253.509792] CPU: 0 PID: 9852 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1253.511369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.513060] Call Trace: [ 1253.513594] dump_stack+0x107/0x167 [ 1253.514351] should_fail.cold+0x5/0xa [ 1253.515144] ? alloc_fs_context+0x57/0x840 [ 1253.516020] should_failslab+0x5/0x20 [ 1253.516791] kmem_cache_alloc_trace+0x55/0x320 [ 1253.517719] ? cap_capable+0x1d6/0x240 [ 1253.518516] alloc_fs_context+0x57/0x840 [ 1253.519351] path_mount+0x931/0x20b0 [ 1253.520123] ? strncpy_from_user+0x9e/0x470 [ 1253.521006] ? finish_automount+0xa90/0xa90 [ 1253.521887] ? getname_flags.part.0+0x1dd/0x4f0 [ 1253.522846] __x64_sys_mount+0x282/0x300 [ 1253.523675] ? copy_mnt_ns+0xa00/0xa00 [ 1253.524485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.525541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.526577] do_syscall_64+0x33/0x40 [ 1253.527339] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.528372] RIP: 0033:0x7ff72614904a [ 1253.529129] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.532804] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.534349] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1253.535795] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.537234] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1253.538677] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.540134] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1253.543478] FAULT_INJECTION: forcing a failure. [ 1253.543478] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.545909] CPU: 0 PID: 9850 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1253.547370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.549054] Call Trace: [ 1253.549589] dump_stack+0x107/0x167 [ 1253.550330] should_fail.cold+0x5/0xa [ 1253.551118] ? copy_mount_options+0x55/0x180 [ 1253.552024] should_failslab+0x5/0x20 [ 1253.552832] kmem_cache_alloc_trace+0x55/0x320 [ 1253.553777] ? _copy_from_user+0xfb/0x1b0 [ 1253.554639] copy_mount_options+0x55/0x180 [ 1253.555503] __x64_sys_mount+0x1a8/0x300 [ 1253.556341] ? copy_mnt_ns+0xa00/0xa00 [ 1253.557132] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.558199] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.559262] do_syscall_64+0x33/0x40 [ 1253.560024] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.561054] RIP: 0033:0x7f05a88b404a [ 1253.561811] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.565522] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.567050] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1253.568493] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.569941] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1253.571377] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.572824] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1253.574841] FAULT_INJECTION: forcing a failure. 03:33:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:33:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:33:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) [ 1253.574841] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.577915] CPU: 0 PID: 9855 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1253.579369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.580134] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.581057] Call Trace: [ 1253.581076] dump_stack+0x107/0x167 [ 1253.581107] should_fail.cold+0x5/0xa [ 1253.584265] ? alloc_fs_context+0x57/0x840 [ 1253.585124] should_failslab+0x5/0x20 [ 1253.585893] kmem_cache_alloc_trace+0x55/0x320 [ 1253.586816] ? cap_capable+0x1d6/0x240 [ 1253.587604] alloc_fs_context+0x57/0x840 [ 1253.588450] path_mount+0x931/0x20b0 [ 1253.589212] ? strncpy_from_user+0x9e/0x470 [ 1253.590069] ? finish_automount+0xa90/0xa90 [ 1253.590943] ? getname_flags.part.0+0x1dd/0x4f0 [ 1253.591888] __x64_sys_mount+0x282/0x300 [ 1253.592709] ? copy_mnt_ns+0xa00/0xa00 [ 1253.593488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.594544] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.595580] do_syscall_64+0x33/0x40 [ 1253.596345] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.597366] RIP: 0033:0x7f101d10c04a [ 1253.598122] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.601805] RSP: 002b:00007f101a65efa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1253.603338] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1253.604787] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.606218] RBP: 00007f101a65f040 R08: 00007f101a65f040 R09: 0000000020000280 [ 1253.607651] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1253.609092] R13: 0000000020000080 R14: 00007f101a65f000 R15: 0000000020000180 [ 1253.611523] FAULT_INJECTION: forcing a failure. [ 1253.611523] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.613852] CPU: 0 PID: 9847 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1253.615226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.616910] Call Trace: [ 1253.617440] dump_stack+0x107/0x167 [ 1253.618182] should_fail.cold+0x5/0xa [ 1253.618962] ? create_object.isra.0+0x3a/0xa20 [ 1253.620001] should_failslab+0x5/0x20 [ 1253.620769] kmem_cache_alloc+0x5b/0x310 [ 1253.621594] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.622655] create_object.isra.0+0x3a/0xa20 [ 1253.623547] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1253.624585] kmem_cache_alloc+0x159/0x310 [ 1253.625426] getname_flags.part.0+0x50/0x4f0 [ 1253.626320] user_path_at_empty+0xa1/0x100 [ 1253.627180] __x64_sys_mount+0x1e9/0x300 [ 1253.628014] ? copy_mnt_ns+0xa00/0xa00 [ 1253.628808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.629869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.630915] do_syscall_64+0x33/0x40 [ 1253.631675] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.632733] RIP: 0033:0x7fd4a117704a [ 1253.633481] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.637191] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.638738] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1253.640185] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.641624] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1253.643059] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.644499] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1253.650429] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:33:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) [ 1253.930409] FAULT_INJECTION: forcing a failure. [ 1253.930409] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.932728] CPU: 0 PID: 9860 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1253.934134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.935851] Call Trace: [ 1253.936400] dump_stack+0x107/0x167 [ 1253.937156] should_fail.cold+0x5/0xa [ 1253.937952] should_failslab+0x5/0x20 [ 1253.938739] __kmalloc_track_caller+0x79/0x370 [ 1253.939673] ? ext4_remount+0xdf/0x26e0 [ 1253.940523] kstrdup+0x36/0x70 [ 1253.941188] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.942215] ext4_remount+0xdf/0x26e0 [ 1253.942999] ? trace_hardirqs_on+0x5b/0x180 [ 1253.943927] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.944964] ? _cond_resched+0x12/0x80 [ 1253.945770] ? shrink_dentry_list+0x134/0x500 [ 1253.946694] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1253.947766] ? shrink_dcache_sb+0x1d5/0x220 [ 1253.948658] ? shrink_dentry_list+0x500/0x500 [ 1253.949594] ? ext4_register_li_request+0x8e0/0x8e0 [ 1253.950622] legacy_reconfigure+0x11b/0x190 [ 1253.951509] reconfigure_super+0x414/0x9c0 [ 1253.952393] ? fs_umode_to_dtype+0xb0/0xb0 [ 1253.953274] path_mount+0x1a75/0x20b0 [ 1253.954064] ? strncpy_from_user+0x9e/0x470 [ 1253.954956] ? finish_automount+0xa90/0xa90 [ 1253.955865] ? getname_flags.part.0+0x1dd/0x4f0 [ 1253.956838] __x64_sys_mount+0x282/0x300 [ 1253.957677] ? copy_mnt_ns+0xa00/0xa00 [ 1253.958485] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.959555] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.960632] do_syscall_64+0x33/0x40 [ 1253.961406] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1253.962453] RIP: 0033:0x7f842a91904a [ 1253.963219] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.966994] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1253.968558] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1253.970008] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1253.971463] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1253.972921] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1253.974375] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1253.982108] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1253.986354] FAULT_INJECTION: forcing a failure. [ 1253.986354] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.989076] CPU: 0 PID: 9862 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1253.990468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.992163] Call Trace: [ 1253.992707] dump_stack+0x107/0x167 [ 1253.993465] should_fail.cold+0x5/0xa [ 1253.994251] ? create_object.isra.0+0x3a/0xa20 [ 1253.995187] should_failslab+0x5/0x20 [ 1253.995989] kmem_cache_alloc+0x5b/0x310 [ 1253.996834] create_object.isra.0+0x3a/0xa20 [ 1253.997739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1253.998778] kmem_cache_alloc+0x159/0x310 [ 1253.999633] getname_flags.part.0+0x50/0x4f0 [ 1254.000730] getname+0x8e/0xd0 [ 1254.001404] do_sys_openat2+0xf9/0x420 [ 1254.002339] ? __kasan_slab_free+0x122/0x160 [ 1254.003265] ? build_open_flags+0x6f0/0x6f0 [ 1254.004320] ? __x64_sys_mount+0x227/0x300 [ 1254.005198] ? kfree+0xd7/0x340 [ 1254.005997] __x64_sys_openat+0x13f/0x1f0 [ 1254.006849] ? __ia32_sys_open+0x1c0/0x1c0 [ 1254.007890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1254.008968] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.010039] do_syscall_64+0x33/0x40 [ 1254.010938] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1254.012006] RIP: 0033:0x7efe557a1a04 [ 1254.012903] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1254.016676] RSP: 002b:00007efe52d63f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1254.018229] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1254.019690] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1254.021161] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1254.022616] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1254.024078] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1254.027022] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1254.036479] FAULT_INJECTION: forcing a failure. [ 1254.036479] name failslab, interval 1, probability 0, space 0, times 0 [ 1254.039007] CPU: 0 PID: 9863 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1254.040431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1254.042197] Call Trace: [ 1254.042743] dump_stack+0x107/0x167 [ 1254.043497] should_fail.cold+0x5/0xa [ 1254.044311] ? getname_flags.part.0+0x50/0x4f0 [ 1254.045247] should_failslab+0x5/0x20 [ 1254.046026] kmem_cache_alloc+0x5b/0x310 [ 1254.046865] getname_flags.part.0+0x50/0x4f0 [ 1254.047780] user_path_at_empty+0xa1/0x100 [ 1254.048658] __x64_sys_mount+0x1e9/0x300 [ 1254.049492] ? copy_mnt_ns+0xa00/0xa00 [ 1254.050297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1254.051367] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1254.052439] do_syscall_64+0x33/0x40 [ 1254.053207] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1254.054255] RIP: 0033:0x7f18473bf04a [ 1254.055020] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1254.058760] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1254.060322] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1254.061777] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1254.063231] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1254.064706] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1254.066164] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1254.068339] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 8) 03:34:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) 03:34:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:34:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:34:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) 03:34:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:34:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) [ 1269.067631] FAULT_INJECTION: forcing a failure. [ 1269.067631] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.070323] CPU: 0 PID: 9877 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1269.071979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.074240] Call Trace: [ 1269.074963] dump_stack+0x107/0x167 [ 1269.075981] should_fail.cold+0x5/0xa [ 1269.077027] ? create_object.isra.0+0x3a/0xa20 [ 1269.078218] should_failslab+0x5/0x20 [ 1269.079066] kmem_cache_alloc+0x5b/0x310 [ 1269.079991] ? mark_held_locks+0x9e/0xe0 [ 1269.080900] create_object.isra.0+0x3a/0xa20 [ 1269.081877] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.083004] __kmalloc_track_caller+0x177/0x370 [ 1269.084044] ? ext4_remount+0x39c/0x26e0 [ 1269.084953] kstrdup+0x36/0x70 [ 1269.085671] ext4_remount+0x39c/0x26e0 [ 1269.086563] ? ext4_register_li_request+0x8e0/0x8e0 [ 1269.087673] ? _cond_resched+0x12/0x80 [ 1269.088559] ? shrink_dentry_list+0x134/0x500 [ 1269.089551] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1269.090719] ? shrink_dentry_list+0x500/0x500 [ 1269.091746] ? ext4_register_li_request+0x8e0/0x8e0 [ 1269.092873] legacy_reconfigure+0x11b/0x190 [ 1269.093839] reconfigure_super+0x414/0x9c0 [ 1269.094818] ? fs_umode_to_dtype+0xb0/0xb0 [ 1269.095772] path_mount+0x1a75/0x20b0 [ 1269.096666] ? strncpy_from_user+0x9e/0x470 [ 1269.097642] ? finish_automount+0xa90/0xa90 [ 1269.098653] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.099709] __x64_sys_mount+0x282/0x300 [ 1269.100632] ? copy_mnt_ns+0xa00/0xa00 [ 1269.101508] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.102697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.103288] FAULT_INJECTION: forcing a failure. [ 1269.103288] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.103833] do_syscall_64+0x33/0x40 [ 1269.103858] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.103883] RIP: 0033:0x7efe557f004a [ 1269.109797] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.113978] RSP: 002b:00007efe52d63fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.115701] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557f004a [ 1269.117604] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.119237] RBP: 00007efe52d64040 R08: 00007efe52d64040 R09: 0000000020000280 [ 1269.120865] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.122474] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1269.124145] CPU: 1 PID: 9879 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1269.125865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.127886] Call Trace: [ 1269.128557] dump_stack+0x107/0x167 [ 1269.129306] should_fail.cold+0x5/0xa [ 1269.130089] ? create_object.isra.0+0x3a/0xa20 [ 1269.131017] should_failslab+0x5/0x20 [ 1269.131793] kmem_cache_alloc+0x5b/0x310 [ 1269.132620] create_object.isra.0+0x3a/0xa20 [ 1269.133515] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.134541] kmem_cache_alloc_trace+0x151/0x320 [ 1269.135476] ? cap_capable+0x1d6/0x240 [ 1269.136274] alloc_fs_context+0x57/0x840 [ 1269.137112] path_mount+0x931/0x20b0 [ 1269.137865] ? strncpy_from_user+0x9e/0x470 [ 1269.138730] ? finish_automount+0xa90/0xa90 [ 1269.139595] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.140561] __x64_sys_mount+0x282/0x300 [ 1269.141382] ? copy_mnt_ns+0xa00/0xa00 [ 1269.142170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.143239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.144290] do_syscall_64+0x33/0x40 [ 1269.145042] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.146076] RIP: 0033:0x7ff72614904a [ 1269.146831] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.150556] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.152110] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1269.153540] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.154968] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1269.156401] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.157826] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1269.162556] FAULT_INJECTION: forcing a failure. [ 1269.162556] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.164851] CPU: 1 PID: 9880 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1269.166214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.167878] Call Trace: [ 1269.168429] dump_stack+0x107/0x167 [ 1269.169188] should_fail.cold+0x5/0xa [ 1269.169971] ? create_object.isra.0+0x3a/0xa20 [ 1269.170595] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.170904] should_failslab+0x5/0x20 [ 1269.170926] kmem_cache_alloc+0x5b/0x310 [ 1269.170952] create_object.isra.0+0x3a/0xa20 [ 1269.172560] FAULT_INJECTION: forcing a failure. [ 1269.172560] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.173015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.173040] kmem_cache_alloc_trace+0x151/0x320 [ 1269.173062] ? cap_capable+0x1d6/0x240 [ 1269.179712] alloc_fs_context+0x57/0x840 [ 1269.180540] path_mount+0x931/0x20b0 [ 1269.181294] ? strncpy_from_user+0x9e/0x470 [ 1269.182163] ? finish_automount+0xa90/0xa90 [ 1269.183031] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.184005] __x64_sys_mount+0x282/0x300 [ 1269.184819] ? copy_mnt_ns+0xa00/0xa00 [ 1269.185618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.186665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.187717] do_syscall_64+0x33/0x40 [ 1269.188478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.189501] RIP: 0033:0x7f101d10c04a [ 1269.190245] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.193940] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.195458] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1269.196882] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.198297] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1269.199714] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.201149] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1269.202606] CPU: 0 PID: 9876 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1269.204175] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.206030] Call Trace: [ 1269.206624] dump_stack+0x107/0x167 [ 1269.207452] should_fail.cold+0x5/0xa [ 1269.208316] ? create_object.isra.0+0x3a/0xa20 [ 1269.209080] FAULT_INJECTION: forcing a failure. [ 1269.209080] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.209351] should_failslab+0x5/0x20 [ 1269.212400] kmem_cache_alloc+0x5b/0x310 [ 1269.213316] ? mark_held_locks+0x9e/0xe0 [ 1269.214232] create_object.isra.0+0x3a/0xa20 [ 1269.215219] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.216373] __kmalloc_track_caller+0x177/0x370 [ 1269.217419] ? ext4_remount+0x39c/0x26e0 [ 1269.218344] kstrdup+0x36/0x70 [ 1269.219073] ext4_remount+0x39c/0x26e0 [ 1269.220002] ? ext4_register_li_request+0x8e0/0x8e0 [ 1269.221128] ? _cond_resched+0x12/0x80 [ 1269.222005] ? shrink_dentry_list+0x134/0x500 [ 1269.223016] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1269.224193] ? shrink_dentry_list+0x500/0x500 [ 1269.225214] ? ext4_register_li_request+0x8e0/0x8e0 [ 1269.226340] legacy_reconfigure+0x11b/0x190 [ 1269.227325] reconfigure_super+0x414/0x9c0 [ 1269.228289] ? fs_umode_to_dtype+0xb0/0xb0 [ 1269.229255] path_mount+0x1a75/0x20b0 [ 1269.230119] ? strncpy_from_user+0x9e/0x470 [ 1269.231097] ? finish_automount+0xa90/0xa90 [ 1269.232086] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.233155] __x64_sys_mount+0x282/0x300 [ 1269.234075] ? copy_mnt_ns+0xa00/0xa00 [ 1269.234958] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.236148] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.237319] do_syscall_64+0x33/0x40 [ 1269.238162] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.239314] RIP: 0033:0x7f842a91904a [ 1269.240167] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.244320] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.246046] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1269.247653] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.249269] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1269.250871] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.252491] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1269.254129] CPU: 1 PID: 9878 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1269.255507] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.257169] Call Trace: [ 1269.257698] dump_stack+0x107/0x167 [ 1269.258435] should_fail.cold+0x5/0xa [ 1269.259200] ? create_object.isra.0+0x3a/0xa20 [ 1269.260132] should_failslab+0x5/0x20 [ 1269.260907] kmem_cache_alloc+0x5b/0x310 [ 1269.261733] create_object.isra.0+0x3a/0xa20 [ 1269.262620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.263648] kmem_cache_alloc_trace+0x151/0x320 [ 1269.264588] ? _copy_from_user+0xfb/0x1b0 [ 1269.265421] copy_mount_options+0x55/0x180 [ 1269.266278] __x64_sys_mount+0x1a8/0x300 [ 1269.267099] ? copy_mnt_ns+0xa00/0xa00 [ 1269.267885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.268945] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.269986] do_syscall_64+0x33/0x40 [ 1269.270745] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.271772] RIP: 0033:0x7f05a88b404a [ 1269.272520] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.276217] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.277740] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1269.279162] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.280587] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1269.282010] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.283428] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1269.295935] FAULT_INJECTION: forcing a failure. [ 1269.295935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.298325] CPU: 1 PID: 9883 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1269.299707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.301383] Call Trace: [ 1269.301910] dump_stack+0x107/0x167 [ 1269.302644] should_fail.cold+0x5/0xa [ 1269.303414] strncpy_from_user+0x34/0x470 [ 1269.304256] getname_flags.part.0+0x95/0x4f0 [ 1269.305143] user_path_at_empty+0xa1/0x100 [ 1269.305997] __x64_sys_mount+0x1e9/0x300 [ 1269.306813] ? copy_mnt_ns+0xa00/0xa00 [ 1269.307597] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.308657] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.309696] do_syscall_64+0x33/0x40 [ 1269.310446] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.311471] RIP: 0033:0x7fd4a117704a [ 1269.312243] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.315910] RSP: 002b:00007fd49e6c9fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1269.317433] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1269.318851] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.319889] FAULT_INJECTION: forcing a failure. [ 1269.319889] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.320277] RBP: 00007fd49e6ca040 R08: 00007fd49e6ca040 R09: 0000000020000280 [ 1269.320297] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1269.325419] R13: 0000000020000080 R14: 00007fd49e6ca000 R15: 0000000020000180 [ 1269.326878] CPU: 0 PID: 9884 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1269.328354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.330070] Call Trace: [ 1269.330608] dump_stack+0x107/0x167 [ 1269.331350] should_fail.cold+0x5/0xa [ 1269.332144] ? create_object.isra.0+0x3a/0xa20 [ 1269.333074] should_failslab+0x5/0x20 [ 1269.333845] kmem_cache_alloc+0x5b/0x310 [ 1269.334664] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.335722] create_object.isra.0+0x3a/0xa20 [ 1269.336617] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.337643] kmem_cache_alloc+0x159/0x310 [ 1269.338488] getname_flags.part.0+0x50/0x4f0 [ 1269.339377] user_path_at_empty+0xa1/0x100 [ 1269.340251] __x64_sys_mount+0x1e9/0x300 [ 1269.341071] ? copy_mnt_ns+0xa00/0xa00 [ 1269.341859] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.342913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.343982] do_syscall_64+0x33/0x40 [ 1269.344741] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.345774] RIP: 0033:0x7f18473bf04a [ 1269.346533] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.350250] RSP: 002b:00007f1844911fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1269.351780] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1269.353227] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.354655] RBP: 00007f1844912040 R08: 00007f1844912040 R09: 0000000020000280 [ 1269.356102] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1269.357533] R13: 0000000020000080 R14: 00007f1844912000 R15: 0000000020000180 03:34:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) [ 1269.379760] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) [ 1269.382524] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.386788] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.391298] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.394604] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.397751] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.399176] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:34:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:34:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:34:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) 03:34:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 9) [ 1269.576502] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.578389] FAULT_INJECTION: forcing a failure. [ 1269.578389] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.581080] CPU: 0 PID: 9890 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1269.582586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.584301] Call Trace: [ 1269.584849] dump_stack+0x107/0x167 [ 1269.585598] should_fail.cold+0x5/0xa [ 1269.586376] ? create_object.isra.0+0x3a/0xa20 [ 1269.587299] should_failslab+0x5/0x20 [ 1269.588081] kmem_cache_alloc+0x5b/0x310 [ 1269.588909] create_object.isra.0+0x3a/0xa20 [ 1269.589802] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.590835] kmem_cache_alloc+0x159/0x310 [ 1269.591683] getname_flags.part.0+0x50/0x4f0 [ 1269.592581] getname+0x8e/0xd0 [ 1269.593235] do_sys_openat2+0xf9/0x420 [ 1269.594022] ? __kasan_slab_free+0x122/0x160 [ 1269.594915] ? build_open_flags+0x6f0/0x6f0 [ 1269.595805] ? __x64_sys_mount+0x227/0x300 [ 1269.596669] ? kfree+0xd7/0x340 [ 1269.597342] __x64_sys_openat+0x13f/0x1f0 [ 1269.598184] ? __ia32_sys_open+0x1c0/0x1c0 [ 1269.599048] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.600113] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.601155] do_syscall_64+0x33/0x40 [ 1269.601913] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.602948] RIP: 0033:0x7efe557a1a04 [ 1269.603711] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1269.607417] RSP: 002b:00007efe52d63f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1269.608954] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1269.610386] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1269.611840] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1269.613279] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1269.614714] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1269.669519] FAULT_INJECTION: forcing a failure. [ 1269.669519] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.671942] CPU: 0 PID: 9893 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1269.673336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.675018] Call Trace: [ 1269.675565] dump_stack+0x107/0x167 [ 1269.676336] should_fail.cold+0x5/0xa [ 1269.677134] ? alloc_fs_context+0x57/0x840 [ 1269.678011] should_failslab+0x5/0x20 [ 1269.678790] kmem_cache_alloc_trace+0x55/0x320 [ 1269.679715] ? cap_capable+0x1d6/0x240 [ 1269.680534] alloc_fs_context+0x57/0x840 [ 1269.681370] path_mount+0x931/0x20b0 [ 1269.682131] ? strncpy_from_user+0x9e/0x470 [ 1269.683010] ? finish_automount+0xa90/0xa90 [ 1269.683884] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.684850] __x64_sys_mount+0x282/0x300 [ 1269.685677] ? copy_mnt_ns+0xa00/0xa00 [ 1269.686476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.687532] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.688587] do_syscall_64+0x33/0x40 [ 1269.689345] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.690382] RIP: 0033:0x7fd4a117704a [ 1269.691139] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.694877] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.696423] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1269.697864] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.699302] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1269.700762] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.702370] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 03:34:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) [ 1269.760078] FAULT_INJECTION: forcing a failure. [ 1269.760078] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.762745] CPU: 0 PID: 9898 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1269.764302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.766181] Call Trace: [ 1269.766793] dump_stack+0x107/0x167 [ 1269.767638] should_fail.cold+0x5/0xa [ 1269.768538] ? create_object.isra.0+0x3a/0xa20 [ 1269.769586] should_failslab+0x5/0x20 [ 1269.770446] kmem_cache_alloc+0x5b/0x310 [ 1269.771371] create_object.isra.0+0x3a/0xa20 [ 1269.772374] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.773526] kmem_cache_alloc_trace+0x151/0x320 [ 1269.774573] ? cap_capable+0x1d6/0x240 [ 1269.775461] alloc_fs_context+0x57/0x840 [ 1269.776410] path_mount+0x931/0x20b0 [ 1269.777259] ? strncpy_from_user+0x9e/0x470 [ 1269.778236] ? finish_automount+0xa90/0xa90 [ 1269.779211] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.780284] __x64_sys_mount+0x282/0x300 [ 1269.781208] ? copy_mnt_ns+0xa00/0xa00 [ 1269.782095] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.783276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.784465] do_syscall_64+0x33/0x40 [ 1269.785310] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.786463] RIP: 0033:0x7f101d10c04a [ 1269.787304] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.791449] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.793184] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1269.794793] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.796406] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1269.798010] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.799614] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1269.811214] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1269.828275] FAULT_INJECTION: forcing a failure. [ 1269.828275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.830680] CPU: 0 PID: 9901 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1269.832084] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.833764] Call Trace: [ 1269.834297] dump_stack+0x107/0x167 [ 1269.835182] should_fail.cold+0x5/0xa [ 1269.835986] strncpy_from_user+0x34/0x470 [ 1269.836835] getname_flags.part.0+0x95/0x4f0 [ 1269.837736] user_path_at_empty+0xa1/0x100 [ 1269.838599] __x64_sys_mount+0x1e9/0x300 [ 1269.839424] ? copy_mnt_ns+0xa00/0xa00 [ 1269.840228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.841289] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.842338] do_syscall_64+0x33/0x40 [ 1269.843096] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.844141] RIP: 0033:0x7f18473bf04a [ 1269.844897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.848634] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.850170] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1269.851608] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.853052] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1269.854487] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.855923] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1269.867656] FAULT_INJECTION: forcing a failure. [ 1269.867656] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.870052] CPU: 1 PID: 9904 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1269.871435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.873133] Call Trace: [ 1269.873671] dump_stack+0x107/0x167 [ 1269.874415] should_fail.cold+0x5/0xa [ 1269.875187] ? getname_flags.part.0+0x50/0x4f0 [ 1269.876121] should_failslab+0x5/0x20 [ 1269.876890] kmem_cache_alloc+0x5b/0x310 [ 1269.877712] ? lock_downgrade+0x6d0/0x6d0 [ 1269.878553] getname_flags.part.0+0x50/0x4f0 [ 1269.879446] getname+0x8e/0xd0 [ 1269.880335] do_sys_openat2+0xf9/0x420 [ 1269.881265] ? __kasan_slab_free+0x122/0x160 [ 1269.882470] ? build_open_flags+0x6f0/0x6f0 [ 1269.883655] ? __x64_sys_mount+0x227/0x300 [ 1269.884740] ? kfree+0xd7/0x340 [ 1269.885636] __x64_sys_openat+0x13f/0x1f0 [ 1269.886756] ? __ia32_sys_open+0x1c0/0x1c0 [ 1269.887870] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.889128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.890361] do_syscall_64+0x33/0x40 [ 1269.891337] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.892595] RIP: 0033:0x7f842a8caa04 [ 1269.893346] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1269.897148] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1269.898798] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1269.900418] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1269.901911] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1269.903349] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1269.904862] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1269.912114] FAULT_INJECTION: forcing a failure. [ 1269.912114] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.914492] CPU: 1 PID: 9905 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1269.915866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.917552] Call Trace: [ 1269.918089] dump_stack+0x107/0x167 [ 1269.918830] should_fail.cold+0x5/0xa [ 1269.919605] ? legacy_init_fs_context+0x44/0xe0 [ 1269.920573] should_failslab+0x5/0x20 [ 1269.921348] kmem_cache_alloc_trace+0x55/0x320 [ 1269.922266] ? lockdep_init_map_type+0x2c7/0x780 [ 1269.923227] legacy_init_fs_context+0x44/0xe0 [ 1269.924138] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1269.925147] alloc_fs_context+0x4fd/0x840 [ 1269.925994] path_mount+0x931/0x20b0 [ 1269.926754] ? strncpy_from_user+0x9e/0x470 [ 1269.927625] ? finish_automount+0xa90/0xa90 [ 1269.928548] ? getname_flags.part.0+0x1dd/0x4f0 [ 1269.929503] __x64_sys_mount+0x282/0x300 [ 1269.930321] ? copy_mnt_ns+0xa00/0xa00 [ 1269.931107] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.932170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.933222] do_syscall_64+0x33/0x40 [ 1269.933979] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.935054] RIP: 0033:0x7ff72614904a [ 1269.935855] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.939794] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.941453] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1269.942899] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.944353] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1269.945899] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.947556] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1269.949835] FAULT_INJECTION: forcing a failure. [ 1269.949835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.952832] CPU: 1 PID: 9903 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1269.954337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.956246] Call Trace: [ 1269.956785] dump_stack+0x107/0x167 [ 1269.957525] should_fail.cold+0x5/0xa [ 1269.958303] _copy_from_user+0x2e/0x1b0 [ 1269.959116] copy_mount_options+0x76/0x180 [ 1269.960008] __x64_sys_mount+0x1a8/0x300 [ 1269.960838] ? copy_mnt_ns+0xa00/0xa00 [ 1269.961626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.962706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.963861] do_syscall_64+0x33/0x40 [ 1269.964881] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1269.965931] RIP: 0033:0x7f05a88b404a [ 1269.966685] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.970415] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1269.971947] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1269.973396] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1269.975112] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1269.976604] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1269.978041] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1270.059335] FAULT_INJECTION: forcing a failure. [ 1270.059335] name failslab, interval 1, probability 0, space 0, times 0 [ 1270.061801] CPU: 1 PID: 9907 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1270.063205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1270.064911] Call Trace: [ 1270.065447] dump_stack+0x107/0x167 [ 1270.066189] should_fail.cold+0x5/0xa [ 1270.066965] ? create_object.isra.0+0x3a/0xa20 [ 1270.067909] should_failslab+0x5/0x20 [ 1270.068708] kmem_cache_alloc+0x5b/0x310 [ 1270.069538] create_object.isra.0+0x3a/0xa20 [ 1270.070432] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1270.071469] kmem_cache_alloc+0x159/0x310 [ 1270.072326] __alloc_file+0x21/0x320 [ 1270.073089] alloc_empty_file+0x6d/0x170 [ 1270.073916] path_openat+0xe3/0x26f0 [ 1270.074690] ? path_lookupat+0x860/0x860 [ 1270.075519] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1270.076600] ? SOFTIRQ_verbose+0x10/0x10 [ 1270.077441] do_filp_open+0x190/0x3e0 [ 1270.078211] ? may_open_dev+0xf0/0xf0 [ 1270.078990] ? __alloc_fd+0x2b8/0x630 [ 1270.079756] ? lock_downgrade+0x6d0/0x6d0 [ 1270.080612] ? do_raw_spin_lock+0x121/0x260 [ 1270.081485] ? rwlock_bug.part.0+0x90/0x90 [ 1270.082348] ? _raw_spin_unlock+0x1a/0x30 [ 1270.083185] ? __alloc_fd+0x2b8/0x630 [ 1270.084007] do_sys_openat2+0x171/0x420 [ 1270.084816] ? __kasan_slab_free+0x122/0x160 [ 1270.085703] ? build_open_flags+0x6f0/0x6f0 [ 1270.086581] ? __x64_sys_mount+0x227/0x300 [ 1270.087439] ? kfree+0xd7/0x340 [ 1270.088121] __x64_sys_openat+0x13f/0x1f0 [ 1270.088958] ? __ia32_sys_open+0x1c0/0x1c0 [ 1270.089819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1270.090876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1270.091922] do_syscall_64+0x33/0x40 [ 1270.092684] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1270.093727] RIP: 0033:0x7efe557a1a04 [ 1270.094539] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1270.098552] RSP: 002b:00007efe52d63f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1270.100196] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1270.101632] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1270.103222] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1270.104807] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1270.106234] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 03:34:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) 03:34:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:34:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:34:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:34:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) 03:34:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 10) 03:34:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) [ 1284.180080] FAULT_INJECTION: forcing a failure. [ 1284.180080] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.182361] FAULT_INJECTION: forcing a failure. [ 1284.182361] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.182547] CPU: 0 PID: 9917 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1284.186016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.187685] Call Trace: [ 1284.188241] dump_stack+0x107/0x167 [ 1284.188986] should_fail.cold+0x5/0xa [ 1284.189759] ? create_object.isra.0+0x3a/0xa20 [ 1284.190684] should_failslab+0x5/0x20 [ 1284.191456] kmem_cache_alloc+0x5b/0x310 [ 1284.192286] ? mark_held_locks+0x9e/0xe0 [ 1284.193117] create_object.isra.0+0x3a/0xa20 [ 1284.194015] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.195058] __kmalloc_track_caller+0x177/0x370 [ 1284.196010] ? ext4_remount+0x39c/0x26e0 [ 1284.196859] kstrdup+0x36/0x70 [ 1284.197519] ext4_remount+0x39c/0x26e0 [ 1284.198346] ? ext4_register_li_request+0x8e0/0x8e0 [ 1284.199369] ? _cond_resched+0x12/0x80 [ 1284.200178] ? shrink_dentry_list+0x134/0x500 [ 1284.201095] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1284.202160] ? shrink_dentry_list+0x500/0x500 [ 1284.203086] ? ext4_register_li_request+0x8e0/0x8e0 [ 1284.204107] legacy_reconfigure+0x11b/0x190 [ 1284.204987] reconfigure_super+0x414/0x9c0 [ 1284.205839] ? fs_umode_to_dtype+0xb0/0xb0 [ 1284.206705] path_mount+0x1a75/0x20b0 [ 1284.207476] ? strncpy_from_user+0x9e/0x470 [ 1284.208369] ? finish_automount+0xa90/0xa90 [ 1284.209252] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.210226] __x64_sys_mount+0x282/0x300 [ 1284.211062] ? copy_mnt_ns+0xa00/0xa00 [ 1284.211861] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.212938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.213995] do_syscall_64+0x33/0x40 [ 1284.214750] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.215800] RIP: 0033:0x7f842a91904a [ 1284.216574] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.220336] RSP: 002b:00007f8427e8cfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.221886] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a91904a [ 1284.223340] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.224808] RBP: 00007f8427e8d040 R08: 00007f8427e8d040 R09: 0000000020000280 [ 1284.226259] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.227706] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1284.229203] CPU: 1 PID: 9918 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1284.230598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.231561] EXT4-fs: 5 callbacks suppressed [ 1284.231573] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.232286] Call Trace: [ 1284.232306] dump_stack+0x107/0x167 [ 1284.232329] should_fail.cold+0x5/0xa [ 1284.232346] ? create_object.isra.0+0x3a/0xa20 [ 1284.232369] should_failslab+0x5/0x20 [ 1284.238102] kmem_cache_alloc+0x5b/0x310 [ 1284.238933] ? create_object.isra.0+0x3ad/0xa20 [ 1284.239889] create_object.isra.0+0x3a/0xa20 [ 1284.240793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.241821] __kmalloc_node+0x1ae/0x420 [ 1284.242627] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1284.243681] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 1284.244722] ? trace_hardirqs_on+0x5b/0x180 [ 1284.245598] kmem_cache_alloc_trace+0x169/0x320 [ 1284.246540] ? cap_capable+0x1d6/0x240 [ 1284.247362] alloc_fs_context+0x57/0x840 [ 1284.248212] path_mount+0x931/0x20b0 [ 1284.248978] ? strncpy_from_user+0x9e/0x470 [ 1284.249870] ? finish_automount+0xa90/0xa90 [ 1284.250745] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.251707] __x64_sys_mount+0x282/0x300 [ 1284.252564] ? copy_mnt_ns+0xa00/0xa00 [ 1284.253364] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.254428] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.255477] do_syscall_64+0x33/0x40 [ 1284.256263] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.257305] RIP: 0033:0x7f101d10c04a [ 1284.258062] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.261802] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.263333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1284.264830] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.266262] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1284.267708] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.269204] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:34:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) [ 1284.279474] FAULT_INJECTION: forcing a failure. [ 1284.279474] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.281828] CPU: 1 PID: 9919 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1284.283221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.284939] Call Trace: [ 1284.285478] dump_stack+0x107/0x167 [ 1284.286232] should_fail.cold+0x5/0xa [ 1284.287009] ? create_object.isra.0+0x3a/0xa20 [ 1284.287941] should_failslab+0x5/0x20 [ 1284.288760] kmem_cache_alloc+0x5b/0x310 [ 1284.289601] create_object.isra.0+0x3a/0xa20 [ 1284.290501] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.291542] kmem_cache_alloc_trace+0x151/0x320 [ 1284.292525] ? cap_capable+0x1d6/0x240 [ 1284.293330] alloc_fs_context+0x57/0x840 [ 1284.294185] path_mount+0x931/0x20b0 [ 1284.294958] ? strncpy_from_user+0x9e/0x470 [ 1284.295850] ? finish_automount+0xa90/0xa90 [ 1284.296758] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.297735] __x64_sys_mount+0x282/0x300 [ 1284.298579] ? copy_mnt_ns+0xa00/0xa00 [ 1284.299384] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.300466] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.301526] do_syscall_64+0x33/0x40 [ 1284.302308] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.303348] RIP: 0033:0x7fd4a117704a [ 1284.304113] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.307886] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.309445] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1284.310917] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.312378] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1284.313848] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.315289] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1284.318328] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.322484] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.324229] FAULT_INJECTION: forcing a failure. [ 1284.324229] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.326099] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.326793] CPU: 0 PID: 9927 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1284.329568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.331254] Call Trace: [ 1284.331796] dump_stack+0x107/0x167 [ 1284.332555] should_fail.cold+0x5/0xa [ 1284.333343] ? alloc_fs_context+0x57/0x840 [ 1284.334206] should_failslab+0x5/0x20 [ 1284.334982] kmem_cache_alloc_trace+0x55/0x320 [ 1284.335902] ? cap_capable+0x1d6/0x240 [ 1284.336704] alloc_fs_context+0x57/0x840 [ 1284.337542] path_mount+0x931/0x20b0 [ 1284.338302] ? strncpy_from_user+0x9e/0x470 [ 1284.339176] ? finish_automount+0xa90/0xa90 [ 1284.340049] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.341016] __x64_sys_mount+0x282/0x300 [ 1284.341835] ? copy_mnt_ns+0xa00/0xa00 [ 1284.342625] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.343680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.344735] do_syscall_64+0x33/0x40 [ 1284.345489] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.346522] RIP: 0033:0x7f18473bf04a [ 1284.347274] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.350993] RSP: 002b:00007f1844911fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1284.352528] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1284.353988] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.355447] RBP: 00007f1844912040 R08: 00007f1844912040 R09: 0000000020000280 [ 1284.356904] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1284.358371] R13: 0000000020000080 R14: 00007f1844912000 R15: 0000000020000180 [ 1284.360946] FAULT_INJECTION: forcing a failure. [ 1284.360946] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.363207] CPU: 1 PID: 9925 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1284.364620] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.365605] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.366298] Call Trace: [ 1284.366318] dump_stack+0x107/0x167 [ 1284.366341] should_fail.cold+0x5/0xa [ 1284.366365] ? getname_flags.part.0+0x50/0x4f0 [ 1284.368382] FAULT_INJECTION: forcing a failure. [ 1284.368382] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.368834] should_failslab+0x5/0x20 [ 1284.368853] kmem_cache_alloc+0x5b/0x310 [ 1284.368879] getname_flags.part.0+0x50/0x4f0 [ 1284.375207] user_path_at_empty+0xa1/0x100 [ 1284.376072] __x64_sys_mount+0x1e9/0x300 [ 1284.376919] ? copy_mnt_ns+0xa00/0xa00 [ 1284.377716] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.378793] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.379839] do_syscall_64+0x33/0x40 [ 1284.380611] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.381648] RIP: 0033:0x7f05a88b404a [ 1284.382410] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.386134] RSP: 002b:00007f05a5e06fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1284.387666] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1284.389135] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.390582] RBP: 00007f05a5e07040 R08: 00007f05a5e07040 R09: 0000000020000280 [ 1284.392024] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1284.393500] R13: 0000000020000080 R14: 00007f05a5e07000 R15: 0000000020000180 [ 1284.394971] CPU: 0 PID: 9928 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1284.396403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.398114] Call Trace: [ 1284.398658] dump_stack+0x107/0x167 [ 1284.399421] should_fail.cold+0x5/0xa [ 1284.400315] ? security_file_alloc+0x34/0x170 [ 1284.401132] FAULT_INJECTION: forcing a failure. [ 1284.401132] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.401254] should_failslab+0x5/0x20 [ 1284.404255] kmem_cache_alloc+0x5b/0x310 [ 1284.405100] security_file_alloc+0x34/0x170 [ 1284.405998] __alloc_file+0xb6/0x320 [ 1284.406770] alloc_empty_file+0x6d/0x170 [ 1284.407610] path_openat+0xe3/0x26f0 [ 1284.408404] ? path_lookupat+0x860/0x860 [ 1284.409243] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1284.410324] ? SOFTIRQ_verbose+0x10/0x10 [ 1284.411166] do_filp_open+0x190/0x3e0 [ 1284.411948] ? may_open_dev+0xf0/0xf0 [ 1284.412735] ? __alloc_fd+0x2b8/0x630 [ 1284.413523] ? lock_downgrade+0x6d0/0x6d0 [ 1284.414360] ? do_raw_spin_lock+0x121/0x260 [ 1284.415242] ? rwlock_bug.part.0+0x90/0x90 [ 1284.416120] ? _raw_spin_unlock+0x1a/0x30 [ 1284.416964] ? __alloc_fd+0x2b8/0x630 [ 1284.417755] do_sys_openat2+0x171/0x420 [ 1284.418563] ? __kasan_slab_free+0x122/0x160 [ 1284.419467] ? build_open_flags+0x6f0/0x6f0 [ 1284.420375] ? __x64_sys_mount+0x227/0x300 [ 1284.421245] ? kfree+0xd7/0x340 [ 1284.421929] __x64_sys_openat+0x13f/0x1f0 [ 1284.422785] ? __ia32_sys_open+0x1c0/0x1c0 [ 1284.423667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.424750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.425818] do_syscall_64+0x33/0x40 [ 1284.426585] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.427637] RIP: 0033:0x7efe557a1a04 [ 1284.428404] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1284.432206] RSP: 002b:00007efe52d42f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1284.433786] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1284.435244] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1284.436711] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1284.438180] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1284.439644] R13: 0000000020000080 R14: 00007efe52d43000 R15: 0000000020000180 [ 1284.441356] CPU: 1 PID: 9926 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1284.442786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.444474] Call Trace: [ 1284.444611] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.445012] dump_stack+0x107/0x167 [ 1284.445041] should_fail.cold+0x5/0xa [ 1284.447724] ? create_object.isra.0+0x3a/0xa20 [ 1284.448654] should_failslab+0x5/0x20 [ 1284.449440] kmem_cache_alloc+0x5b/0x310 [ 1284.450284] create_object.isra.0+0x3a/0xa20 [ 1284.451191] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.452260] kmem_cache_alloc_trace+0x151/0x320 [ 1284.453283] ? lockdep_init_map_type+0x2c7/0x780 [ 1284.454261] legacy_init_fs_context+0x44/0xe0 [ 1284.455302] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1284.456352] alloc_fs_context+0x4fd/0x840 [ 1284.457212] path_mount+0x931/0x20b0 [ 1284.457976] ? strncpy_from_user+0x9e/0x470 [ 1284.458876] ? finish_automount+0xa90/0xa90 [ 1284.459755] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.460735] __x64_sys_mount+0x282/0x300 [ 1284.461560] ? copy_mnt_ns+0xa00/0xa00 [ 1284.462355] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.463410] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.464480] do_syscall_64+0x33/0x40 [ 1284.465248] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.466281] RIP: 0033:0x7ff72614904a [ 1284.467037] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.470796] RSP: 002b:00007ff72369bfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1284.472357] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1284.473820] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.475255] RBP: 00007ff72369c040 R08: 00007ff72369c040 R09: 0000000020000280 [ 1284.476721] R10: 0000000002044034 R11: 0000000000000202 R12: 0000000020000280 [ 1284.478195] R13: 0000000020000080 R14: 00007ff72369c000 R15: 0000000020000180 03:34:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) 03:34:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) [ 1284.496969] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) 03:34:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:34:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 11) 03:34:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) [ 1284.719057] FAULT_INJECTION: forcing a failure. [ 1284.719057] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.721375] CPU: 0 PID: 9935 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1284.722765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.724476] Call Trace: [ 1284.725017] dump_stack+0x107/0x167 [ 1284.725767] should_fail.cold+0x5/0xa [ 1284.726555] should_failslab+0x5/0x20 [ 1284.727335] __kmalloc_track_caller+0x79/0x370 [ 1284.728277] ? ext4_remount+0xdf/0x26e0 [ 1284.729099] kstrdup+0x36/0x70 [ 1284.729763] ? ext4_register_li_request+0x8e0/0x8e0 [ 1284.730804] ext4_remount+0xdf/0x26e0 [ 1284.731585] ? trace_hardirqs_on+0x5b/0x180 [ 1284.732508] ? ext4_register_li_request+0x8e0/0x8e0 [ 1284.733528] ? _cond_resched+0x12/0x80 [ 1284.734337] ? shrink_dentry_list+0x134/0x500 [ 1284.735245] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1284.736326] ? shrink_dcache_sb+0x1d5/0x220 [ 1284.737203] ? shrink_dentry_list+0x500/0x500 [ 1284.738133] ? ext4_register_li_request+0x8e0/0x8e0 [ 1284.739148] legacy_reconfigure+0x11b/0x190 [ 1284.740025] reconfigure_super+0x414/0x9c0 [ 1284.740916] ? fs_umode_to_dtype+0xb0/0xb0 [ 1284.741786] path_mount+0x1a75/0x20b0 [ 1284.742562] ? strncpy_from_user+0x9e/0x470 [ 1284.743467] ? finish_automount+0xa90/0xa90 [ 1284.744358] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.745336] __x64_sys_mount+0x282/0x300 [ 1284.746167] ? copy_mnt_ns+0xa00/0xa00 [ 1284.746976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.748036] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.749111] do_syscall_64+0x33/0x40 [ 1284.749871] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.750929] RIP: 0033:0x7f101d10c04a [ 1284.751700] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.755481] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.757026] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1284.758488] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.759951] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1284.761400] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.762853] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1284.780061] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.782933] FAULT_INJECTION: forcing a failure. [ 1284.782933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1284.785332] CPU: 0 PID: 9940 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1284.786761] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.788467] Call Trace: [ 1284.789021] dump_stack+0x107/0x167 [ 1284.789777] should_fail.cold+0x5/0xa [ 1284.790561] strncpy_from_user+0x34/0x470 [ 1284.791405] getname_flags.part.0+0x95/0x4f0 [ 1284.792311] getname+0x8e/0xd0 [ 1284.792966] do_sys_openat2+0xf9/0x420 [ 1284.793758] ? __kasan_slab_free+0x122/0x160 [ 1284.794646] ? build_open_flags+0x6f0/0x6f0 [ 1284.795528] ? __x64_sys_mount+0x227/0x300 [ 1284.796410] ? kfree+0xd7/0x340 [ 1284.797090] __x64_sys_openat+0x13f/0x1f0 [ 1284.797931] ? __ia32_sys_open+0x1c0/0x1c0 [ 1284.798801] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.799866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.800927] do_syscall_64+0x33/0x40 [ 1284.801689] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.802730] RIP: 0033:0x7f842a8caa04 [ 1284.803487] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1284.807214] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1284.808783] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1284.810234] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1284.811672] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1284.813133] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1284.814568] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1284.825566] FAULT_INJECTION: forcing a failure. [ 1284.825566] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.828049] CPU: 0 PID: 9941 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1284.829479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.831169] Call Trace: [ 1284.831713] dump_stack+0x107/0x167 [ 1284.832471] should_fail.cold+0x5/0xa [ 1284.833250] ? alloc_fs_context+0x57/0x840 [ 1284.834116] should_failslab+0x5/0x20 [ 1284.834891] kmem_cache_alloc_trace+0x55/0x320 [ 1284.835818] ? cap_capable+0x1d6/0x240 [ 1284.836633] alloc_fs_context+0x57/0x840 [ 1284.837462] path_mount+0x931/0x20b0 [ 1284.838231] ? strncpy_from_user+0x9e/0x470 [ 1284.839115] ? finish_automount+0xa90/0xa90 [ 1284.840005] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.840980] __x64_sys_mount+0x282/0x300 [ 1284.841820] ? copy_mnt_ns+0xa00/0xa00 [ 1284.842632] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.843696] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.844778] do_syscall_64+0x33/0x40 [ 1284.845554] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.846598] RIP: 0033:0x7f18473bf04a [ 1284.847358] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.851111] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.852663] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1284.854103] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.855536] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1284.856981] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.858418] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1284.887432] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1284.891640] FAULT_INJECTION: forcing a failure. [ 1284.891640] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.894136] CPU: 0 PID: 9944 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1284.895559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.897273] Call Trace: [ 1284.897812] dump_stack+0x107/0x167 [ 1284.898557] should_fail.cold+0x5/0xa [ 1284.899339] ? create_object.isra.0+0x3a/0xa20 [ 1284.900280] should_failslab+0x5/0x20 [ 1284.901065] kmem_cache_alloc+0x5b/0x310 [ 1284.901895] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1284.903032] create_object.isra.0+0x3a/0xa20 [ 1284.903926] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.904983] kmem_cache_alloc+0x159/0x310 [ 1284.905864] security_file_alloc+0x34/0x170 [ 1284.906742] __alloc_file+0xb6/0x320 [ 1284.907513] alloc_empty_file+0x6d/0x170 [ 1284.908351] path_openat+0xe3/0x26f0 [ 1284.909128] ? path_lookupat+0x860/0x860 [ 1284.909955] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1284.911029] ? SOFTIRQ_verbose+0x10/0x10 [ 1284.911865] do_filp_open+0x190/0x3e0 [ 1284.912667] ? may_open_dev+0xf0/0xf0 [ 1284.913443] ? __alloc_fd+0x2b8/0x630 [ 1284.914221] ? lock_downgrade+0x6d0/0x6d0 [ 1284.915063] ? do_raw_spin_lock+0x121/0x260 [ 1284.915947] ? rwlock_bug.part.0+0x90/0x90 [ 1284.916823] ? _raw_spin_unlock+0x1a/0x30 [ 1284.917660] ? __alloc_fd+0x2b8/0x630 [ 1284.918440] do_sys_openat2+0x171/0x420 [ 1284.919251] ? __kasan_slab_free+0x122/0x160 [ 1284.920147] ? build_open_flags+0x6f0/0x6f0 [ 1284.921043] ? __x64_sys_mount+0x227/0x300 [ 1284.921900] ? kfree+0xd7/0x340 [ 1284.922574] __x64_sys_openat+0x13f/0x1f0 [ 1284.923415] ? __ia32_sys_open+0x1c0/0x1c0 [ 1284.924300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.925365] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.926414] do_syscall_64+0x33/0x40 [ 1284.927177] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.928222] RIP: 0033:0x7efe557a1a04 [ 1284.928984] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1284.932715] RSP: 002b:00007efe52d63f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1284.934281] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe557a1a04 [ 1284.935726] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1284.937177] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1284.938613] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1284.940084] R13: 0000000020000080 R14: 00007efe52d64000 R15: 0000000020000180 [ 1284.943134] FAULT_INJECTION: forcing a failure. [ 1284.943134] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.945503] CPU: 1 PID: 9943 Comm: syz-executor.1 Not tainted 5.10.202 #1 [ 1284.946930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.948663] Call Trace: [ 1284.949233] dump_stack+0x107/0x167 [ 1284.950024] should_fail.cold+0x5/0xa [ 1284.950828] ? legacy_init_fs_context+0x44/0xe0 [ 1284.951799] should_failslab+0x5/0x20 [ 1284.952593] kmem_cache_alloc_trace+0x55/0x320 [ 1284.953526] ? lockdep_init_map_type+0x2c7/0x780 [ 1284.954494] legacy_init_fs_context+0x44/0xe0 [ 1284.955423] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1284.956452] alloc_fs_context+0x4fd/0x840 [ 1284.957320] path_mount+0x931/0x20b0 [ 1284.958090] ? strncpy_from_user+0x9e/0x470 [ 1284.958983] ? finish_automount+0xa90/0xa90 [ 1284.959875] ? getname_flags.part.0+0x1dd/0x4f0 [ 1284.960853] __x64_sys_mount+0x282/0x300 [ 1284.961668] ? copy_mnt_ns+0xa00/0xa00 [ 1284.962466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.963528] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.964611] do_syscall_64+0x33/0x40 [ 1284.965374] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1284.966418] RIP: 0033:0x7fd4a117704a [ 1284.967180] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.970921] RSP: 002b:00007fd49e6eafa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1284.972470] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd4a117704a [ 1284.973936] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1284.975388] RBP: 00007fd49e6eb040 R08: 00007fd49e6eb040 R09: 0000000020000280 [ 1284.976849] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1284.978301] R13: 0000000020000080 R14: 00007fd49e6eb000 R15: 0000000020000180 [ 1284.995734] FAULT_INJECTION: forcing a failure. [ 1284.995734] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.996846] FAULT_INJECTION: forcing a failure. [ 1284.996846] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.998070] CPU: 1 PID: 9947 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1285.001710] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.003416] Call Trace: [ 1285.003973] dump_stack+0x107/0x167 [ 1285.004745] should_fail.cold+0x5/0xa [ 1285.005518] should_failslab+0x5/0x20 [ 1285.006304] __kmalloc_track_caller+0x79/0x370 [ 1285.007247] ? ext4_remount+0xdf/0x26e0 [ 1285.008093] kstrdup+0x36/0x70 [ 1285.008777] ? ext4_register_li_request+0x8e0/0x8e0 [ 1285.009810] ext4_remount+0xdf/0x26e0 [ 1285.010589] ? shrink_dentry_list+0x28d/0x500 [ 1285.011510] ? lock_downgrade+0x6d0/0x6d0 [ 1285.012378] ? lock_downgrade+0x6d0/0x6d0 [ 1285.013251] ? do_raw_spin_lock+0x121/0x260 [ 1285.014139] ? rwlock_bug.part.0+0x90/0x90 [ 1285.015013] ? ext4_register_li_request+0x8e0/0x8e0 [ 1285.016031] ? do_raw_spin_unlock+0x4f/0x220 [ 1285.016965] ? _raw_spin_unlock+0x1a/0x30 [ 1285.017828] ? shrink_dentry_list+0x134/0x500 [ 1285.018756] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1285.019829] ? shrink_dcache_sb+0x1d5/0x220 [ 1285.020735] ? shrink_dentry_list+0x500/0x500 [ 1285.021658] ? ext4_register_li_request+0x8e0/0x8e0 [ 1285.022689] legacy_reconfigure+0x11b/0x190 [ 1285.023586] reconfigure_super+0x414/0x9c0 [ 1285.024460] ? fs_umode_to_dtype+0xb0/0xb0 [ 1285.025342] path_mount+0x1a75/0x20b0 [ 1285.026124] ? strncpy_from_user+0x9e/0x470 [ 1285.027035] ? finish_automount+0xa90/0xa90 [ 1285.027917] ? getname_flags.part.0+0x1dd/0x4f0 [ 1285.028904] __x64_sys_mount+0x282/0x300 [ 1285.029741] ? copy_mnt_ns+0xa00/0xa00 [ 1285.030537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.031599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.032684] do_syscall_64+0x33/0x40 [ 1285.033463] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1285.034506] RIP: 0033:0x7ff72614904a [ 1285.035275] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.039031] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1285.040711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1285.042511] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1285.044334] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1285.045810] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1285.047265] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1285.048781] CPU: 0 PID: 9946 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1285.050182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1285.051942] Call Trace: [ 1285.052485] dump_stack+0x107/0x167 [ 1285.053228] should_fail.cold+0x5/0xa [ 1285.054004] ? create_object.isra.0+0x3a/0xa20 [ 1285.054931] should_failslab+0x5/0x20 [ 1285.055708] kmem_cache_alloc+0x5b/0x310 [ 1285.056552] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.057623] create_object.isra.0+0x3a/0xa20 [ 1285.058511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1285.059543] kmem_cache_alloc+0x159/0x310 [ 1285.060400] getname_flags.part.0+0x50/0x4f0 [ 1285.061293] user_path_at_empty+0xa1/0x100 [ 1285.062153] __x64_sys_mount+0x1e9/0x300 [ 1285.062975] ? copy_mnt_ns+0xa00/0xa00 [ 1285.063772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1285.064837] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1285.065888] do_syscall_64+0x33/0x40 [ 1285.066646] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1285.067682] RIP: 0033:0x7f05a88b404a [ 1285.068453] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1285.072168] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1285.073714] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1285.075152] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1285.076603] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1285.078050] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1285.079522] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1285.081575] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) 03:34:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 12) 03:34:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:34:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:34:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:34:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) 03:34:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) [ 1298.398233] EXT4-fs: 2 callbacks suppressed [ 1298.398246] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.400466] FAULT_INJECTION: forcing a failure. [ 1298.400466] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.401852] CPU: 0 PID: 9960 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1298.402245] FAULT_INJECTION: forcing a failure. [ 1298.402245] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.402666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.402671] Call Trace: [ 1298.402687] dump_stack+0x107/0x167 [ 1298.402704] should_fail.cold+0x5/0xa [ 1298.402718] ? create_object.isra.0+0x3a/0xa20 [ 1298.402740] should_failslab+0x5/0x20 [ 1298.408061] kmem_cache_alloc+0x5b/0x310 [ 1298.408564] create_object.isra.0+0x3a/0xa20 [ 1298.409089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1298.409698] __kmalloc_track_caller+0x177/0x370 [ 1298.410250] ? ext4_remount+0xdf/0x26e0 [ 1298.410730] kstrdup+0x36/0x70 [ 1298.411112] ? ext4_register_li_request+0x8e0/0x8e0 [ 1298.411705] ext4_remount+0xdf/0x26e0 [ 1298.412146] ? shrink_dentry_list+0x28d/0x500 [ 1298.412695] ? lock_downgrade+0x6d0/0x6d0 [ 1298.413188] ? lock_downgrade+0x6d0/0x6d0 [ 1298.413680] ? do_raw_spin_lock+0x121/0x260 [ 1298.414196] ? rwlock_bug.part.0+0x90/0x90 [ 1298.414704] ? ext4_register_li_request+0x8e0/0x8e0 [ 1298.415313] ? do_raw_spin_unlock+0x4f/0x220 [ 1298.415840] ? _raw_spin_unlock+0x1a/0x30 [ 1298.416336] ? shrink_dentry_list+0x134/0x500 [ 1298.416862] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1298.417484] ? shrink_dcache_sb+0x1d5/0x220 [ 1298.417998] ? shrink_dentry_list+0x500/0x500 [ 1298.418533] ? ext4_register_li_request+0x8e0/0x8e0 [ 1298.419128] legacy_reconfigure+0x11b/0x190 [ 1298.419639] reconfigure_super+0x414/0x9c0 [ 1298.420149] ? fs_umode_to_dtype+0xb0/0xb0 [ 1298.420660] path_mount+0x1a75/0x20b0 [ 1298.421127] ? strncpy_from_user+0x9e/0x470 [ 1298.421638] ? finish_automount+0xa90/0xa90 [ 1298.422151] ? getname_flags.part.0+0x1dd/0x4f0 [ 1298.422713] __x64_sys_mount+0x282/0x300 [ 1298.423201] ? copy_mnt_ns+0xa00/0xa00 [ 1298.423667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.424286] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.424878] do_syscall_64+0x33/0x40 [ 1298.425319] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.425926] RIP: 0033:0x7ff72614904a [ 1298.426368] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.428549] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.429452] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1298.430286] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.431129] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1298.431972] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.432833] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1298.433691] CPU: 1 PID: 9959 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1298.434203] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.435073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.435080] Call Trace: [ 1298.435103] dump_stack+0x107/0x167 [ 1298.435127] should_fail.cold+0x5/0xa [ 1298.435149] ? create_object.isra.0+0x3a/0xa20 [ 1298.435174] should_failslab+0x5/0x20 [ 1298.441126] kmem_cache_alloc+0x5b/0x310 [ 1298.441946] create_object.isra.0+0x3a/0xa20 [ 1298.442838] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1298.443857] kmem_cache_alloc+0x159/0x310 [ 1298.444710] getname_flags.part.0+0x50/0x4f0 [ 1298.445590] getname+0x8e/0xd0 [ 1298.446240] do_sys_openat2+0xf9/0x420 [ 1298.447021] ? __kasan_slab_free+0x122/0x160 [ 1298.447912] ? build_open_flags+0x6f0/0x6f0 [ 1298.448797] ? __x64_sys_mount+0x227/0x300 [ 1298.449732] ? kfree+0xd7/0x340 [ 1298.450447] __x64_sys_openat+0x13f/0x1f0 [ 1298.451396] ? __ia32_sys_open+0x1c0/0x1c0 [ 1298.452300] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.453371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.454420] do_syscall_64+0x33/0x40 [ 1298.455170] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.456195] RIP: 0033:0x7f842a8caa04 [ 1298.456970] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1298.460735] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1298.462282] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1298.463736] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1298.465186] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1298.466630] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1298.468058] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1298.474241] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) [ 1298.478303] FAULT_INJECTION: forcing a failure. [ 1298.478303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1298.479043] FAULT_INJECTION: forcing a failure. [ 1298.479043] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.480148] CPU: 0 PID: 9961 Comm: syz-executor.6 Not tainted 5.10.202 #1 [ 1298.483402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.484707] Call Trace: [ 1298.485110] dump_stack+0x107/0x167 [ 1298.485672] should_fail.cold+0x5/0xa [ 1298.486260] _copy_to_user+0x2e/0x180 [ 1298.486847] simple_read_from_buffer+0xcc/0x160 [ 1298.487556] proc_fail_nth_read+0x198/0x230 [ 1298.488216] ? proc_sessionid_read+0x230/0x230 [ 1298.488937] ? security_file_permission+0x24e/0x570 [ 1298.489528] ? perf_trace_initcall_start+0x101/0x380 [ 1298.490112] ? proc_sessionid_read+0x230/0x230 [ 1298.490643] vfs_read+0x228/0x580 [ 1298.491036] ksys_read+0x12d/0x260 [ 1298.491455] ? vfs_write+0xa70/0xa70 [ 1298.491884] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.492497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.493086] do_syscall_64+0x33/0x40 [ 1298.493525] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.494104] RIP: 0033:0x7efe557a169c [ 1298.494537] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1298.496602] RSP: 002b:00007efe52d64170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1298.497475] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007efe557a169c [ 1298.498312] RDX: 000000000000000f RSI: 00007efe52d641e0 RDI: 0000000000000003 [ 1298.499150] RBP: 00007efe52d641d0 R08: 0000000000000000 R09: 0000000020000280 [ 1298.499983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1298.500829] R13: 00007ffe58675fdf R14: 00007efe52d64300 R15: 0000000000022000 [ 1298.501680] CPU: 1 PID: 9962 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1298.503060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.504728] Call Trace: [ 1298.505254] dump_stack+0x107/0x167 [ 1298.505989] should_fail.cold+0x5/0xa [ 1298.506761] ? create_object.isra.0+0x3a/0xa20 [ 1298.507683] should_failslab+0x5/0x20 [ 1298.508469] kmem_cache_alloc+0x5b/0x310 [ 1298.509290] create_object.isra.0+0x3a/0xa20 [ 1298.510193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1298.511221] kmem_cache_alloc_trace+0x151/0x320 03:34:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1298.512154] ? lockdep_init_map_type+0x2c7/0x780 [ 1298.513244] legacy_init_fs_context+0x44/0xe0 [ 1298.514149] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1298.515162] alloc_fs_context+0x4fd/0x840 [ 1298.516005] path_mount+0x931/0x20b0 [ 1298.516810] ? strncpy_from_user+0x9e/0x470 [ 1298.517682] ? finish_automount+0xa90/0xa90 [ 1298.518563] ? getname_flags.part.0+0x1dd/0x4f0 [ 1298.519517] __x64_sys_mount+0x282/0x300 [ 1298.520346] ? copy_mnt_ns+0xa00/0xa00 [ 1298.521156] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.522222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.523264] do_syscall_64+0x33/0x40 [ 1298.524019] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.525063] RIP: 0033:0x7f101d10c04a [ 1298.525812] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.529515] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.531048] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1298.532485] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.533914] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1298.535341] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.536787] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1298.546137] FAULT_INJECTION: forcing a failure. [ 1298.546137] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.548710] CPU: 1 PID: 9966 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1298.550349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.552064] Call Trace: [ 1298.552702] dump_stack+0x107/0x167 [ 1298.553457] should_fail.cold+0x5/0xa [ 1298.554234] ? legacy_init_fs_context+0x44/0xe0 [ 1298.555324] should_failslab+0x5/0x20 [ 1298.556143] kmem_cache_alloc_trace+0x55/0x320 [ 1298.557089] ? lockdep_init_map_type+0x2c7/0x780 [ 1298.558064] legacy_init_fs_context+0x44/0xe0 [ 1298.558975] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1298.560116] alloc_fs_context+0x4fd/0x840 [ 1298.561099] path_mount+0x931/0x20b0 [ 1298.561892] ? strncpy_from_user+0x9e/0x470 [ 1298.562763] ? finish_automount+0xa90/0xa90 [ 1298.563632] ? getname_flags.part.0+0x1dd/0x4f0 [ 1298.564589] __x64_sys_mount+0x282/0x300 [ 1298.565504] ? copy_mnt_ns+0xa00/0xa00 [ 1298.566456] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.567547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.568638] do_syscall_64+0x33/0x40 [ 1298.569394] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.570432] RIP: 0033:0x7f18473bf04a [ 1298.571181] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.575117] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.576746] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1298.578265] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.579852] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1298.581378] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.582850] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1298.589287] FAULT_INJECTION: forcing a failure. [ 1298.589287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1298.592581] CPU: 1 PID: 9964 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1298.594445] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.596742] Call Trace: [ 1298.597423] dump_stack+0x107/0x167 [ 1298.598424] should_fail.cold+0x5/0xa [ 1298.599359] strncpy_from_user+0x34/0x470 [ 1298.600283] getname_flags.part.0+0x95/0x4f0 [ 1298.601305] user_path_at_empty+0xa1/0x100 [ 1298.602220] __x64_sys_mount+0x1e9/0x300 [ 1298.603243] ? copy_mnt_ns+0xa00/0xa00 [ 1298.604102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.605309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.606429] do_syscall_64+0x33/0x40 [ 1298.607301] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.608512] RIP: 0033:0x7f05a88b404a [ 1298.609313] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.613329] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.615049] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1298.616695] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.618236] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1298.619768] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.621199] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1298.626155] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.631489] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.655989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.664777] FAULT_INJECTION: forcing a failure. [ 1298.664777] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.667080] CPU: 1 PID: 9973 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1298.668606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.670290] Call Trace: [ 1298.670936] dump_stack+0x107/0x167 [ 1298.671892] should_fail.cold+0x5/0xa [ 1298.672706] should_failslab+0x5/0x20 [ 1298.673571] __kmalloc_track_caller+0x79/0x370 [ 1298.674491] ? ext4_remount+0x39c/0x26e0 [ 1298.675356] kstrdup+0x36/0x70 [ 1298.676130] ext4_remount+0x39c/0x26e0 [ 1298.677115] ? ext4_register_li_request+0x8e0/0x8e0 [ 1298.678259] ? do_raw_spin_unlock+0x4f/0x220 [ 1298.679297] ? _raw_spin_unlock+0x1a/0x30 [ 1298.680350] ? shrink_dentry_list+0x134/0x500 [ 1298.681291] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1298.682474] ? shrink_dentry_list+0x500/0x500 [ 1298.683553] ? ext4_register_li_request+0x8e0/0x8e0 [ 1298.684782] legacy_reconfigure+0x11b/0x190 [ 1298.685655] reconfigure_super+0x414/0x9c0 [ 1298.686596] ? fs_umode_to_dtype+0xb0/0xb0 [ 1298.687625] path_mount+0x1a75/0x20b0 [ 1298.688478] ? strncpy_from_user+0x9e/0x470 [ 1298.689468] ? finish_automount+0xa90/0xa90 [ 1298.690479] ? getname_flags.part.0+0x1dd/0x4f0 [ 1298.691599] __x64_sys_mount+0x282/0x300 [ 1298.692541] ? copy_mnt_ns+0xa00/0xa00 [ 1298.693340] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.694406] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.695454] do_syscall_64+0x33/0x40 [ 1298.696211] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.697255] RIP: 0033:0x7ff72614904a [ 1298.698019] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.701692] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.703231] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1298.704671] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.706108] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1298.707537] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.708985] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:34:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 13) 03:34:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) 03:34:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) [ 1298.828267] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.857769] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.870540] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.873384] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1298.929150] FAULT_INJECTION: forcing a failure. [ 1298.929150] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.931563] CPU: 1 PID: 9986 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1298.932958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.934629] Call Trace: [ 1298.935167] dump_stack+0x107/0x167 [ 1298.935907] should_fail.cold+0x5/0xa [ 1298.936710] ? alloc_fs_context+0x57/0x840 [ 1298.937570] should_failslab+0x5/0x20 [ 1298.938360] kmem_cache_alloc_trace+0x55/0x320 [ 1298.939293] ? cap_capable+0x1d6/0x240 [ 1298.940087] alloc_fs_context+0x57/0x840 [ 1298.940930] path_mount+0x931/0x20b0 [ 1298.941691] ? strncpy_from_user+0x9e/0x470 [ 1298.942565] ? finish_automount+0xa90/0xa90 [ 1298.943434] ? getname_flags.part.0+0x1dd/0x4f0 [ 1298.944405] __x64_sys_mount+0x282/0x300 [ 1298.945228] ? copy_mnt_ns+0xa00/0xa00 [ 1298.946018] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1298.947076] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1298.948120] do_syscall_64+0x33/0x40 [ 1298.948884] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1298.949915] RIP: 0033:0x7f05a88b404a [ 1298.950667] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1298.954371] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1298.955902] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1298.957367] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1298.958796] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1298.960226] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1298.961665] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1298.975198] FAULT_INJECTION: forcing a failure. [ 1298.975198] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.977789] CPU: 1 PID: 9987 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1298.979174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1298.980854] Call Trace: [ 1298.981389] dump_stack+0x107/0x167 [ 1298.982233] should_fail.cold+0x5/0xa [ 1298.983137] ? create_object.isra.0+0x3a/0xa20 [ 1298.984070] should_failslab+0x5/0x20 [ 1298.984854] kmem_cache_alloc+0x5b/0x310 [ 1298.985677] create_object.isra.0+0x3a/0xa20 [ 1298.986564] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1298.987838] kmem_cache_alloc+0x159/0x310 [ 1298.988694] __alloc_file+0x21/0x320 [ 1298.989446] alloc_empty_file+0x6d/0x170 [ 1298.990269] path_openat+0xe3/0x26f0 [ 1298.991036] ? path_lookupat+0x860/0x860 [ 1298.991953] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1298.993188] ? SOFTIRQ_verbose+0x10/0x10 [ 1298.994027] do_filp_open+0x190/0x3e0 [ 1298.994792] ? may_open_dev+0xf0/0xf0 [ 1298.995566] ? __alloc_fd+0x2b8/0x630 [ 1298.996403] ? lock_downgrade+0x6d0/0x6d0 [ 1298.997434] ? do_raw_spin_lock+0x121/0x260 [ 1298.998309] ? rwlock_bug.part.0+0x90/0x90 [ 1298.999171] ? _raw_spin_unlock+0x1a/0x30 [ 1299.000005] ? __alloc_fd+0x2b8/0x630 [ 1299.000814] do_sys_openat2+0x171/0x420 [ 1299.001748] ? __kasan_slab_free+0x122/0x160 [ 1299.002724] ? build_open_flags+0x6f0/0x6f0 [ 1299.003595] ? __x64_sys_mount+0x227/0x300 [ 1299.004465] ? kfree+0xd7/0x340 [ 1299.005137] __x64_sys_openat+0x13f/0x1f0 [ 1299.006106] ? __ia32_sys_open+0x1c0/0x1c0 [ 1299.007055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.008115] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.009184] do_syscall_64+0x33/0x40 [ 1299.009942] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1299.011123] RIP: 0033:0x7f842a8caa04 [ 1299.011973] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1299.015671] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1299.017477] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1299.018911] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1299.020433] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1299.022043] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1299.023479] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1299.038047] FAULT_INJECTION: forcing a failure. [ 1299.038047] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.040467] CPU: 1 PID: 9988 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1299.041853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.043536] Call Trace: [ 1299.044069] dump_stack+0x107/0x167 [ 1299.044819] should_fail.cold+0x5/0xa [ 1299.045584] ? create_object.isra.0+0x3a/0xa20 [ 1299.046514] should_failslab+0x5/0x20 [ 1299.047299] kmem_cache_alloc+0x5b/0x310 [ 1299.048352] create_object.isra.0+0x3a/0xa20 [ 1299.049606] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1299.050885] kmem_cache_alloc_trace+0x151/0x320 [ 1299.052204] ? lockdep_init_map_type+0x2c7/0x780 [ 1299.053444] legacy_init_fs_context+0x44/0xe0 [ 1299.054725] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1299.056079] alloc_fs_context+0x4fd/0x840 [ 1299.057146] path_mount+0x931/0x20b0 [ 1299.058215] ? strncpy_from_user+0x9e/0x470 [ 1299.059357] ? finish_automount+0xa90/0xa90 [ 1299.060515] ? getname_flags.part.0+0x1dd/0x4f0 [ 1299.061840] __x64_sys_mount+0x282/0x300 [ 1299.062975] ? copy_mnt_ns+0xa00/0xa00 [ 1299.063976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.065428] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.066552] do_syscall_64+0x33/0x40 [ 1299.067398] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1299.068638] RIP: 0033:0x7f18473bf04a [ 1299.069456] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.073175] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1299.074712] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1299.076149] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1299.077600] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1299.079030] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1299.080471] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 03:34:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) 03:34:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) 03:34:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:34:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) 03:34:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 14) [ 1314.134989] EXT4-fs: 4 callbacks suppressed [ 1314.135000] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.143802] FAULT_INJECTION: forcing a failure. [ 1314.143802] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.146240] CPU: 1 PID: 10000 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1314.147769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.149531] Call Trace: [ 1314.150125] dump_stack+0x107/0x167 [ 1314.150907] should_fail.cold+0x5/0xa [ 1314.151720] ? __alloc_file+0x21/0x320 [ 1314.152588] should_failslab+0x5/0x20 [ 1314.153380] kmem_cache_alloc+0x5b/0x310 [ 1314.154187] __alloc_file+0x21/0x320 [ 1314.154925] alloc_empty_file+0x6d/0x170 [ 1314.155733] path_openat+0xe3/0x26f0 [ 1314.156477] ? path_lookupat+0x860/0x860 [ 1314.157302] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1314.158332] ? SOFTIRQ_verbose+0x10/0x10 [ 1314.159155] do_filp_open+0x190/0x3e0 [ 1314.159902] ? may_open_dev+0xf0/0xf0 [ 1314.160663] ? __alloc_fd+0x2b8/0x630 [ 1314.161412] ? lock_downgrade+0x6d0/0x6d0 [ 1314.162228] ? do_raw_spin_lock+0x121/0x260 [ 1314.163079] ? rwlock_bug.part.0+0x90/0x90 [ 1314.163934] ? _raw_spin_unlock+0x1a/0x30 [ 1314.164753] ? __alloc_fd+0x2b8/0x630 [ 1314.165526] do_sys_openat2+0x171/0x420 [ 1314.166308] ? __kasan_slab_free+0x122/0x160 [ 1314.167177] ? build_open_flags+0x6f0/0x6f0 [ 1314.168031] ? __x64_sys_mount+0x227/0x300 [ 1314.168880] ? kfree+0xd7/0x340 [ 1314.169537] __x64_sys_openat+0x13f/0x1f0 [ 1314.170362] ? __ia32_sys_open+0x1c0/0x1c0 [ 1314.171202] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.172233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.173258] do_syscall_64+0x33/0x40 [ 1314.174129] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.175165] RIP: 0033:0x7f842a8caa04 [ 1314.175926] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1314.179641] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1314.181192] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1314.182626] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1314.184068] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1314.185522] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1314.186974] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1314.196519] FAULT_INJECTION: forcing a failure. [ 1314.196519] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.199042] CPU: 1 PID: 10001 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1314.200457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.202141] Call Trace: [ 1314.202685] dump_stack+0x107/0x167 [ 1314.203424] should_fail.cold+0x5/0xa [ 1314.204197] ? create_object.isra.0+0x3a/0xa20 [ 1314.205125] should_failslab+0x5/0x20 [ 1314.205894] kmem_cache_alloc+0x5b/0x310 [ 1314.206708] ? mark_held_locks+0x9e/0xe0 [ 1314.207535] create_object.isra.0+0x3a/0xa20 [ 1314.208426] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1314.209470] __kmalloc_track_caller+0x177/0x370 [ 1314.210409] ? ext4_remount+0x39c/0x26e0 [ 1314.211248] kstrdup+0x36/0x70 [ 1314.211899] ext4_remount+0x39c/0x26e0 [ 1314.212729] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.213739] ? _cond_resched+0x12/0x80 [ 1314.214525] ? shrink_dentry_list+0x134/0x500 [ 1314.215433] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1314.216482] ? shrink_dentry_list+0x500/0x500 [ 1314.217409] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.218416] legacy_reconfigure+0x11b/0x190 [ 1314.219286] reconfigure_super+0x414/0x9c0 [ 1314.220140] ? fs_umode_to_dtype+0xb0/0xb0 [ 1314.221012] path_mount+0x1a75/0x20b0 [ 1314.221786] ? strncpy_from_user+0x9e/0x470 [ 1314.222661] ? finish_automount+0xa90/0xa90 [ 1314.223531] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.224481] __x64_sys_mount+0x282/0x300 [ 1314.225307] ? copy_mnt_ns+0xa00/0xa00 [ 1314.226109] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.227164] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.228214] do_syscall_64+0x33/0x40 [ 1314.228987] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.230023] RIP: 0033:0x7ff72614904a [ 1314.230776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.234471] RSP: 002b:00007ff7236bcfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.236005] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff72614904a [ 1314.237469] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.238963] RBP: 00007ff7236bd040 R08: 00007ff7236bd040 R09: 0000000020000280 [ 1314.240369] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.241768] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1314.249086] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.250482] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.254966] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.256394] FAULT_INJECTION: forcing a failure. [ 1314.256394] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.258693] CPU: 0 PID: 10002 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1314.260071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.261711] Call Trace: [ 1314.262243] dump_stack+0x107/0x167 [ 1314.262972] should_fail.cold+0x5/0xa [ 1314.263738] should_failslab+0x5/0x20 [ 1314.264501] __kmalloc_track_caller+0x79/0x370 [ 1314.265426] ? ext4_remount+0xdf/0x26e0 [ 1314.266221] kstrdup+0x36/0x70 [ 1314.266869] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.267859] ext4_remount+0xdf/0x26e0 [ 1314.268628] ? trace_hardirqs_on+0x5b/0x180 [ 1314.269502] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.270484] ? _cond_resched+0x12/0x80 [ 1314.271256] ? shrink_dentry_list+0x134/0x500 [ 1314.272136] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1314.273164] ? shrink_dcache_sb+0x1d5/0x220 [ 1314.274018] ? shrink_dentry_list+0x500/0x500 [ 1314.274912] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.275893] legacy_reconfigure+0x11b/0x190 [ 1314.276762] reconfigure_super+0x414/0x9c0 [ 1314.277593] ? fs_umode_to_dtype+0xb0/0xb0 [ 1314.278436] path_mount+0x1a75/0x20b0 [ 1314.279190] ? strncpy_from_user+0x9e/0x470 [ 1314.280057] ? finish_automount+0xa90/0xa90 [ 1314.280913] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.281850] __x64_sys_mount+0x282/0x300 [ 1314.282651] ? copy_mnt_ns+0xa00/0xa00 [ 1314.283432] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.284459] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.285496] do_syscall_64+0x33/0x40 [ 1314.286237] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.287244] RIP: 0033:0x7f18473bf04a [ 1314.287979] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.291574] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.293072] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1314.294474] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.295872] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1314.297280] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.298677] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1314.300466] FAULT_INJECTION: forcing a failure. [ 1314.300466] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.302986] CPU: 1 PID: 10005 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1314.304348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.305984] Call Trace: [ 1314.306507] dump_stack+0x107/0x167 [ 1314.307229] should_fail.cold+0x5/0xa [ 1314.307987] should_failslab+0x5/0x20 [ 1314.308745] __kmalloc_track_caller+0x79/0x370 [ 1314.309640] ? ext4_remount+0x39c/0x26e0 [ 1314.310450] kstrdup+0x36/0x70 [ 1314.311088] ext4_remount+0x39c/0x26e0 [ 1314.311884] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.312882] ? do_raw_spin_unlock+0x4f/0x220 [ 1314.313752] ? _raw_spin_unlock+0x1a/0x30 [ 1314.314570] ? shrink_dentry_list+0x134/0x500 [ 1314.315450] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1314.316476] ? shrink_dentry_list+0x500/0x500 [ 1314.317374] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.318358] legacy_reconfigure+0x11b/0x190 [ 1314.319208] reconfigure_super+0x414/0x9c0 [ 1314.320041] ? fs_umode_to_dtype+0xb0/0xb0 [ 1314.320898] path_mount+0x1a75/0x20b0 [ 1314.321661] ? strncpy_from_user+0x9e/0x470 [ 1314.322516] ? finish_automount+0xa90/0xa90 [ 1314.323384] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.324318] __x64_sys_mount+0x282/0x300 [ 1314.325155] ? copy_mnt_ns+0xa00/0xa00 [ 1314.325928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.326961] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.328002] do_syscall_64+0x33/0x40 [ 1314.328762] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.329777] RIP: 0033:0x7f101d10c04a [ 1314.330510] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.334111] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.335599] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1314.337127] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.338563] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1314.340002] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.341454] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1314.344641] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.346534] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) 03:34:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) [ 1314.357571] FAULT_INJECTION: forcing a failure. [ 1314.357571] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.360101] CPU: 1 PID: 10006 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1314.361578] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.363262] Call Trace: [ 1314.363800] dump_stack+0x107/0x167 [ 1314.364622] should_fail.cold+0x5/0xa [ 1314.365447] ? create_object.isra.0+0x3a/0xa20 [ 1314.366449] should_failslab+0x5/0x20 [ 1314.367217] kmem_cache_alloc+0x5b/0x310 [ 1314.368048] create_object.isra.0+0x3a/0xa20 [ 1314.368952] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1314.369980] kmem_cache_alloc_trace+0x151/0x320 [ 1314.370989] ? cap_capable+0x1d6/0x240 [ 1314.371783] alloc_fs_context+0x57/0x840 [ 1314.372687] path_mount+0x931/0x20b0 [ 1314.373599] ? strncpy_from_user+0x9e/0x470 [ 1314.374476] ? finish_automount+0xa90/0xa90 [ 1314.375349] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.376303] __x64_sys_mount+0x282/0x300 [ 1314.377139] ? copy_mnt_ns+0xa00/0xa00 [ 1314.377959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.379124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.380222] do_syscall_64+0x33/0x40 [ 1314.380994] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.382101] RIP: 0033:0x7f05a88b404a [ 1314.382858] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.386796] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.388419] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1314.389870] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.391389] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1314.392990] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.394516] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1314.398176] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.401792] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.417892] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:34:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:34:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:34:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) 03:34:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 15) 03:34:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1314.551818] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1314.562506] FAULT_INJECTION: forcing a failure. [ 1314.562506] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.564934] CPU: 1 PID: 10015 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1314.566354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.568054] Call Trace: [ 1314.568615] dump_stack+0x107/0x167 [ 1314.569368] should_fail.cold+0x5/0xa [ 1314.570157] ? security_file_alloc+0x34/0x170 [ 1314.571082] should_failslab+0x5/0x20 [ 1314.571862] kmem_cache_alloc+0x5b/0x310 [ 1314.572707] security_file_alloc+0x34/0x170 [ 1314.573592] __alloc_file+0xb6/0x320 [ 1314.574351] alloc_empty_file+0x6d/0x170 [ 1314.575177] path_openat+0xe3/0x26f0 [ 1314.575944] ? path_lookupat+0x860/0x860 [ 1314.576807] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1314.577868] ? SOFTIRQ_verbose+0x10/0x10 [ 1314.578708] do_filp_open+0x190/0x3e0 [ 1314.579477] ? may_open_dev+0xf0/0xf0 [ 1314.580253] ? __alloc_fd+0x2b8/0x630 [ 1314.581032] ? lock_downgrade+0x6d0/0x6d0 [ 1314.581874] ? do_raw_spin_lock+0x121/0x260 [ 1314.582753] ? rwlock_bug.part.0+0x90/0x90 [ 1314.583622] ? _raw_spin_unlock+0x1a/0x30 [ 1314.584459] ? __alloc_fd+0x2b8/0x630 [ 1314.585250] do_sys_openat2+0x171/0x420 [ 1314.585812] FAULT_INJECTION: forcing a failure. [ 1314.585812] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.586062] ? __kasan_slab_free+0x122/0x160 [ 1314.589159] ? build_open_flags+0x6f0/0x6f0 [ 1314.590043] ? __x64_sys_mount+0x227/0x300 [ 1314.590913] ? kfree+0xd7/0x340 [ 1314.591594] __x64_sys_openat+0x13f/0x1f0 [ 1314.592437] ? __ia32_sys_open+0x1c0/0x1c0 [ 1314.593317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.594389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.595445] do_syscall_64+0x33/0x40 [ 1314.596216] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.597268] RIP: 0033:0x7f842a8caa04 [ 1314.598033] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1314.601774] RSP: 002b:00007f8427e8cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1314.603150] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f842a8caa04 [ 1314.604436] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1314.605738] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1314.607022] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1314.608311] R13: 0000000020000080 R14: 00007f8427e8d000 R15: 0000000020000180 [ 1314.609643] CPU: 0 PID: 10014 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1314.610949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.612856] Call Trace: [ 1314.613429] dump_stack+0x107/0x167 [ 1314.614274] should_fail.cold+0x5/0xa [ 1314.615109] ? getname_flags.part.0+0x50/0x4f0 [ 1314.616093] should_failslab+0x5/0x20 [ 1314.616925] kmem_cache_alloc+0x5b/0x310 [ 1314.617812] ? lock_downgrade+0x6d0/0x6d0 [ 1314.618722] getname_flags.part.0+0x50/0x4f0 [ 1314.619776] getname+0x8e/0xd0 [ 1314.620543] do_sys_openat2+0xf9/0x420 [ 1314.621500] ? __kasan_slab_free+0x122/0x160 [ 1314.622497] ? build_open_flags+0x6f0/0x6f0 [ 1314.623474] ? __x64_sys_mount+0x227/0x300 [ 1314.624373] ? kfree+0xd7/0x340 [ 1314.625058] __x64_sys_openat+0x13f/0x1f0 [ 1314.625880] ? __ia32_sys_open+0x1c0/0x1c0 [ 1314.626734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.627779] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.628774] do_syscall_64+0x33/0x40 [ 1314.629449] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.630370] RIP: 0033:0x7ff7260faa04 [ 1314.631105] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1314.634768] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1314.636307] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1314.637738] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1314.639153] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1314.640555] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1314.641964] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:34:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:34:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) [ 1314.767912] FAULT_INJECTION: forcing a failure. [ 1314.767912] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.770286] CPU: 1 PID: 10026 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1314.771674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.773340] Call Trace: [ 1314.773877] dump_stack+0x107/0x167 [ 1314.774614] should_fail.cold+0x5/0xa [ 1314.775393] ? legacy_init_fs_context+0x44/0xe0 [ 1314.776331] should_failslab+0x5/0x20 [ 1314.777134] kmem_cache_alloc_trace+0x55/0x320 [ 1314.778051] ? lockdep_init_map_type+0x2c7/0x780 [ 1314.779055] legacy_init_fs_context+0x44/0xe0 [ 1314.779970] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1314.780997] alloc_fs_context+0x4fd/0x840 [ 1314.781886] path_mount+0x931/0x20b0 [ 1314.782653] ? strncpy_from_user+0x9e/0x470 [ 1314.783579] ? finish_automount+0xa90/0xa90 [ 1314.784460] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.785478] __x64_sys_mount+0x282/0x300 [ 1314.786306] ? copy_mnt_ns+0xa00/0xa00 [ 1314.787101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.788184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.789248] do_syscall_64+0x33/0x40 [ 1314.790004] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.791034] RIP: 0033:0x7f18473bf04a [ 1314.791812] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.795769] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.797362] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1314.798805] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.800259] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1314.801760] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.803189] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 03:34:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1314.833887] FAULT_INJECTION: forcing a failure. [ 1314.833887] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.836230] CPU: 1 PID: 10029 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1314.837657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.839313] Call Trace: [ 1314.839861] dump_stack+0x107/0x167 [ 1314.840628] should_fail.cold+0x5/0xa [ 1314.841392] ? create_object.isra.0+0x3a/0xa20 [ 1314.842310] should_failslab+0x5/0x20 [ 1314.843087] kmem_cache_alloc+0x5b/0x310 [ 1314.843918] ? mark_held_locks+0x9e/0xe0 [ 1314.844741] create_object.isra.0+0x3a/0xa20 [ 1314.845642] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1314.846660] __kmalloc_track_caller+0x177/0x370 [ 1314.847613] ? ext4_remount+0x39c/0x26e0 [ 1314.848444] kstrdup+0x36/0x70 [ 1314.849101] ext4_remount+0x39c/0x26e0 [ 1314.849951] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.850977] ? _cond_resched+0x12/0x80 [ 1314.851756] ? shrink_dentry_list+0x134/0x500 [ 1314.852661] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1314.853687] ? shrink_dentry_list+0x500/0x500 [ 1314.854581] ? ext4_register_li_request+0x8e0/0x8e0 [ 1314.855566] legacy_reconfigure+0x11b/0x190 [ 1314.856431] reconfigure_super+0x414/0x9c0 [ 1314.857275] ? fs_umode_to_dtype+0xb0/0xb0 [ 1314.858121] path_mount+0x1a75/0x20b0 [ 1314.858882] ? strncpy_from_user+0x9e/0x470 [ 1314.859737] ? finish_automount+0xa90/0xa90 [ 1314.860628] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.861621] __x64_sys_mount+0x282/0x300 [ 1314.862425] ? copy_mnt_ns+0xa00/0xa00 [ 1314.863272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.864305] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.865337] do_syscall_64+0x33/0x40 [ 1314.866101] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.867111] RIP: 0033:0x7f101d10c04a [ 1314.867870] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.871547] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.873073] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1314.874479] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.875946] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1314.877409] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.878808] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1314.902712] FAULT_INJECTION: forcing a failure. [ 1314.902712] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.904924] CPU: 1 PID: 10030 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1314.906311] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.907930] Call Trace: [ 1314.908443] dump_stack+0x107/0x167 [ 1314.909177] should_fail.cold+0x5/0xa [ 1314.909963] ? legacy_init_fs_context+0x44/0xe0 [ 1314.910904] should_failslab+0x5/0x20 [ 1314.911684] kmem_cache_alloc_trace+0x55/0x320 [ 1314.912607] ? lockdep_init_map_type+0x2c7/0x780 [ 1314.913555] legacy_init_fs_context+0x44/0xe0 [ 1314.914434] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1314.915409] alloc_fs_context+0x4fd/0x840 [ 1314.916228] path_mount+0x931/0x20b0 [ 1314.916975] ? strncpy_from_user+0x9e/0x470 [ 1314.917822] ? finish_automount+0xa90/0xa90 [ 1314.918663] ? getname_flags.part.0+0x1dd/0x4f0 [ 1314.919586] __x64_sys_mount+0x282/0x300 [ 1314.920375] ? copy_mnt_ns+0xa00/0xa00 [ 1314.921149] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.922177] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.923189] do_syscall_64+0x33/0x40 [ 1314.923920] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1314.924927] RIP: 0033:0x7f05a88b404a [ 1314.925661] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.929253] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1314.930724] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1314.932095] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1314.933474] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1314.934848] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1314.936217] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1315.063787] FAULT_INJECTION: forcing a failure. [ 1315.063787] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1315.066272] CPU: 0 PID: 10035 Comm: syz-executor.0 Not tainted 5.10.202 #1 [ 1315.067675] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1315.069452] Call Trace: [ 1315.070005] dump_stack+0x107/0x167 [ 1315.070755] should_fail.cold+0x5/0xa [ 1315.071544] _copy_to_user+0x2e/0x180 [ 1315.072331] simple_read_from_buffer+0xcc/0x160 [ 1315.073307] proc_fail_nth_read+0x198/0x230 [ 1315.074185] ? proc_sessionid_read+0x230/0x230 [ 1315.075122] ? security_file_permission+0x24e/0x570 [ 1315.076135] ? perf_trace_initcall_start+0x101/0x380 [ 1315.076816] FAULT_INJECTION: forcing a failure. [ 1315.076816] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.077190] ? proc_sessionid_read+0x230/0x230 [ 1315.080321] vfs_read+0x228/0x580 [ 1315.081044] ksys_read+0x12d/0x260 [ 1315.081764] ? vfs_write+0xa70/0xa70 [ 1315.082519] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1315.083596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.084655] do_syscall_64+0x33/0x40 [ 1315.085412] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1315.086445] RIP: 0033:0x7f842a8ca69c [ 1315.087203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1315.090901] RSP: 002b:00007f8427e8d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1315.092437] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f842a8ca69c [ 1315.093896] RDX: 000000000000000f RSI: 00007f8427e8d1e0 RDI: 0000000000000003 [ 1315.095330] RBP: 00007f8427e8d1d0 R08: 0000000000000000 R09: 0000000020000280 [ 1315.096781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1315.098212] R13: 00007fffc6c08d0f R14: 00007f8427e8d300 R15: 0000000000022000 [ 1315.099683] CPU: 1 PID: 10036 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1315.101113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1315.102800] Call Trace: [ 1315.103336] dump_stack+0x107/0x167 [ 1315.104078] should_fail.cold+0x5/0xa [ 1315.104860] ? create_object.isra.0+0x3a/0xa20 [ 1315.105786] should_failslab+0x5/0x20 [ 1315.106549] kmem_cache_alloc+0x5b/0x310 [ 1315.107389] create_object.isra.0+0x3a/0xa20 [ 1315.108277] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1315.109322] kmem_cache_alloc+0x159/0x310 [ 1315.110176] getname_flags.part.0+0x50/0x4f0 [ 1315.111080] getname+0x8e/0xd0 [ 1315.111740] do_sys_openat2+0xf9/0x420 [ 1315.112537] ? __kasan_slab_free+0x122/0x160 [ 1315.113426] ? build_open_flags+0x6f0/0x6f0 [ 1315.114310] ? __x64_sys_mount+0x227/0x300 [ 1315.115160] ? kfree+0xd7/0x340 [ 1315.115835] __x64_sys_openat+0x13f/0x1f0 [ 1315.116690] ? __ia32_sys_open+0x1c0/0x1c0 [ 1315.117554] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1315.118621] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1315.119678] do_syscall_64+0x33/0x40 [ 1315.120436] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1315.121471] RIP: 0033:0x7ff7260faa04 [ 1315.122225] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1315.125948] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1315.127481] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1315.128922] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1315.130346] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1315.131868] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1315.133350] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) 03:35:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) 03:35:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) 03:35:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 16) 03:35:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1337.759268] EXT4-fs: 12 callbacks suppressed [ 1337.759279] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.764335] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.769390] FAULT_INJECTION: forcing a failure. [ 1337.769390] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.772469] CPU: 0 PID: 10051 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1337.774299] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.776423] Call Trace: [ 1337.777134] dump_stack+0x107/0x167 [ 1337.778074] should_fail.cold+0x5/0xa [ 1337.778944] should_failslab+0x5/0x20 [ 1337.779808] __kmalloc_track_caller+0x79/0x370 [ 1337.780842] ? ext4_remount+0x39c/0x26e0 [ 1337.781781] kstrdup+0x36/0x70 [ 1337.782519] ext4_remount+0x39c/0x26e0 [ 1337.783440] ? ext4_register_li_request+0x8e0/0x8e0 [ 1337.784562] ? _cond_resched+0x12/0x80 [ 1337.785453] ? shrink_dentry_list+0x134/0x500 03:35:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1337.786458] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1337.787794] ? shrink_dentry_list+0x500/0x500 [ 1337.788813] ? ext4_register_li_request+0x8e0/0x8e0 [ 1337.789966] legacy_reconfigure+0x11b/0x190 [ 1337.790933] reconfigure_super+0x414/0x9c0 [ 1337.791881] ? fs_umode_to_dtype+0xb0/0xb0 [ 1337.792836] path_mount+0x1a75/0x20b0 [ 1337.793702] ? strncpy_from_user+0x9e/0x470 [ 1337.794667] ? finish_automount+0xa90/0xa90 [ 1337.795629] ? getname_flags.part.0+0x1dd/0x4f0 [ 1337.796686] __x64_sys_mount+0x282/0x300 [ 1337.797619] ? copy_mnt_ns+0xa00/0xa00 [ 1337.798460] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.799517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.800562] do_syscall_64+0x33/0x40 [ 1337.801341] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1337.802383] RIP: 0033:0x7f18473bf04a [ 1337.803164] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.806885] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.808405] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1337.809851] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1337.811288] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1337.812724] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1337.814176] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1337.822542] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.827315] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.828100] FAULT_INJECTION: forcing a failure. [ 1337.828100] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.829484] CPU: 1 PID: 10054 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1337.830342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.831279] Call Trace: [ 1337.831585] dump_stack+0x107/0x167 [ 1337.832013] should_fail.cold+0x5/0xa [ 1337.832457] ? getname_flags.part.0+0x50/0x4f0 [ 1337.833015] should_failslab+0x5/0x20 [ 1337.833461] kmem_cache_alloc+0x5b/0x310 [ 1337.833952] ? lock_downgrade+0x6d0/0x6d0 [ 1337.834439] getname_flags.part.0+0x50/0x4f0 [ 1337.834972] getname+0x8e/0xd0 [ 1337.835348] do_sys_openat2+0xf9/0x420 [ 1337.835818] ? __kasan_slab_free+0x122/0x160 [ 1337.836328] ? build_open_flags+0x6f0/0x6f0 [ 1337.836835] ? __x64_sys_mount+0x227/0x300 [ 1337.837346] ? kfree+0xd7/0x340 [ 1337.837746] __x64_sys_openat+0x13f/0x1f0 [ 1337.838345] ? __ia32_sys_open+0x1c0/0x1c0 [ 1337.838862] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.839479] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.840102] do_syscall_64+0x33/0x40 [ 1337.840552] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1337.841184] RIP: 0033:0x7f101d0bda04 [ 1337.841629] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1337.843841] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1337.844748] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1337.845629] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1337.846474] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1337.847327] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1337.848191] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1337.852273] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:35:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) [ 1337.856185] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.859363] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.861491] FAULT_INJECTION: forcing a failure. [ 1337.861491] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.863829] CPU: 0 PID: 10056 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1337.865229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.866944] Call Trace: [ 1337.867482] dump_stack+0x107/0x167 [ 1337.868244] should_fail.cold+0x5/0xa [ 1337.869033] ? create_object.isra.0+0x3a/0xa20 [ 1337.869978] should_failslab+0x5/0x20 [ 1337.870747] kmem_cache_alloc+0x5b/0x310 [ 1337.871589] create_object.isra.0+0x3a/0xa20 [ 1337.872497] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1337.873554] kmem_cache_alloc_trace+0x151/0x320 [ 1337.874500] ? lockdep_init_map_type+0x2c7/0x780 [ 1337.875469] legacy_init_fs_context+0x44/0xe0 [ 1337.876369] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1337.877396] alloc_fs_context+0x4fd/0x840 [ 1337.878244] path_mount+0x931/0x20b0 [ 1337.879000] ? strncpy_from_user+0x9e/0x470 [ 1337.879875] ? finish_automount+0xa90/0xa90 [ 1337.880738] ? getname_flags.part.0+0x1dd/0x4f0 [ 1337.881716] __x64_sys_mount+0x282/0x300 [ 1337.882554] ? copy_mnt_ns+0xa00/0xa00 [ 1337.883347] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.884429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.885484] do_syscall_64+0x33/0x40 [ 1337.886242] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1337.887277] RIP: 0033:0x7f05a88b404a [ 1337.888035] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1337.891760] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1337.893321] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1337.894755] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1337.896180] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1337.897611] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1337.899029] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1337.899764] FAULT_INJECTION: forcing a failure. [ 1337.899764] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1337.901890] CPU: 1 PID: 10057 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1337.902726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1337.903728] Call Trace: [ 1337.904083] dump_stack+0x107/0x167 [ 1337.904543] should_fail.cold+0x5/0xa [ 1337.905006] strncpy_from_user+0x34/0x470 [ 1337.905458] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.905519] getname_flags.part.0+0x95/0x4f0 [ 1337.907210] getname+0x8e/0xd0 [ 1337.907605] do_sys_openat2+0xf9/0x420 [ 1337.908087] ? __kasan_slab_free+0x122/0x160 [ 1337.908628] ? build_open_flags+0x6f0/0x6f0 [ 1337.909170] ? __x64_sys_mount+0x227/0x300 [ 1337.909688] ? kfree+0xd7/0x340 [ 1337.910089] __x64_sys_openat+0x13f/0x1f0 [ 1337.910594] ? __ia32_sys_open+0x1c0/0x1c0 [ 1337.911070] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1337.911711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1337.912297] do_syscall_64+0x33/0x40 [ 1337.912753] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1337.913351] RIP: 0033:0x7ff7260faa04 [ 1337.913806] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1337.916055] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1337.916931] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1337.917804] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1337.918659] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1337.919531] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1337.920399] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1337.928815] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1337.933290] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1338.085235] FAULT_INJECTION: forcing a failure. [ 1338.085235] name failslab, interval 1, probability 0, space 0, times 0 [ 1338.087117] CPU: 1 PID: 10064 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1338.088193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1338.089501] Call Trace: [ 1338.089850] dump_stack+0x107/0x167 [ 1338.090272] should_fail.cold+0x5/0xa [ 1338.090715] ? create_object.isra.0+0x3a/0xa20 [ 1338.091219] should_failslab+0x5/0x20 [ 1338.091663] kmem_cache_alloc+0x5b/0x310 [ 1338.092128] create_object.isra.0+0x3a/0xa20 [ 1338.092602] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1338.093198] __kmalloc_track_caller+0x177/0x370 [ 1338.093711] ? ext4_remount+0xdf/0x26e0 [ 1338.094174] kstrdup+0x36/0x70 [ 1338.094524] ? ext4_register_li_request+0x8e0/0x8e0 [ 1338.095101] ext4_remount+0xdf/0x26e0 [ 1338.095513] ? trace_hardirqs_on+0x5b/0x180 [ 1338.096019] ? ext4_register_li_request+0x8e0/0x8e0 [ 1338.096554] ? _cond_resched+0x12/0x80 [ 1338.097012] ? shrink_dentry_list+0x134/0x500 [ 1338.097519] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1338.098091] ? shrink_dcache_sb+0x1d5/0x220 [ 1338.098581] ? shrink_dentry_list+0x500/0x500 [ 1338.099074] ? ext4_register_li_request+0x8e0/0x8e0 [ 1338.099653] legacy_reconfigure+0x11b/0x190 [ 1338.100127] reconfigure_super+0x414/0x9c0 [ 1338.100604] ? fs_umode_to_dtype+0xb0/0xb0 [ 1338.101091] path_mount+0x1a75/0x20b0 [ 1338.101531] ? strncpy_from_user+0x9e/0x470 [ 1338.102020] ? finish_automount+0xa90/0xa90 [ 1338.102513] ? getname_flags.part.0+0x1dd/0x4f0 [ 1338.103047] __x64_sys_mount+0x282/0x300 [ 1338.103524] ? copy_mnt_ns+0xa00/0xa00 [ 1338.103971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1338.104567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1338.105163] do_syscall_64+0x33/0x40 [ 1338.105594] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1338.106182] RIP: 0033:0x7f18473bf04a [ 1338.106612] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1338.108692] RSP: 002b:00007f1844932fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1338.109565] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f18473bf04a [ 1338.110377] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1338.111176] RBP: 00007f1844933040 R08: 00007f1844933040 R09: 0000000020000280 [ 1338.111983] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1338.112792] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 03:35:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:35:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 17) 03:35:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) 03:35:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) 03:35:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1350.758636] EXT4-fs: 5 callbacks suppressed [ 1350.759835] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.765164] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.768808] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.775250] FAULT_INJECTION: forcing a failure. [ 1350.775250] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.778020] CPU: 1 PID: 10086 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1350.779593] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.781455] Call Trace: [ 1350.782051] dump_stack+0x107/0x167 [ 1350.782881] should_fail.cold+0x5/0xa [ 1350.783823] should_failslab+0x5/0x20 [ 1350.784310] FAULT_INJECTION: forcing a failure. [ 1350.784310] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.784680] __kmalloc_track_caller+0x79/0x370 [ 1350.784700] ? ext4_remount+0xdf/0x26e0 [ 1350.784729] kstrdup+0x36/0x70 [ 1350.789134] ? ext4_register_li_request+0x8e0/0x8e0 [ 1350.790256] ext4_remount+0xdf/0x26e0 [ 1350.791125] ? shrink_dentry_list+0x28d/0x500 [ 1350.792138] ? lock_downgrade+0x6d0/0x6d0 [ 1350.793093] ? lock_downgrade+0x6d0/0x6d0 [ 1350.793989] ? do_raw_spin_lock+0x121/0x260 [ 1350.794865] ? rwlock_bug.part.0+0x90/0x90 [ 1350.795743] ? ext4_register_li_request+0x8e0/0x8e0 [ 1350.796751] ? do_raw_spin_unlock+0x4f/0x220 [ 1350.797659] ? _raw_spin_unlock+0x1a/0x30 [ 1350.798497] ? shrink_dentry_list+0x134/0x500 [ 1350.799420] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1350.800575] ? shrink_dcache_sb+0x1d5/0x220 [ 1350.801565] ? shrink_dentry_list+0x500/0x500 [ 1350.802596] ? ext4_register_li_request+0x8e0/0x8e0 [ 1350.803727] legacy_reconfigure+0x11b/0x190 [ 1350.804709] reconfigure_super+0x414/0x9c0 [ 1350.805689] ? fs_umode_to_dtype+0xb0/0xb0 [ 1350.806656] path_mount+0x1a75/0x20b0 [ 1350.807528] ? strncpy_from_user+0x9e/0x470 [ 1350.808513] ? finish_automount+0xa90/0xa90 [ 1350.809498] ? getname_flags.part.0+0x1dd/0x4f0 [ 1350.810572] __x64_sys_mount+0x282/0x300 [ 1350.811495] ? copy_mnt_ns+0xa00/0xa00 [ 1350.812386] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.813586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.814766] do_syscall_64+0x33/0x40 [ 1350.815616] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.816778] RIP: 0033:0x7f05a88b404a [ 1350.817630] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.821778] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1350.823485] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1350.825102] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1350.826713] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1350.828316] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1350.829921] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1350.831550] CPU: 0 PID: 10083 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1350.832361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.833328] Call Trace: [ 1350.833625] dump_stack+0x107/0x167 [ 1350.834048] should_fail.cold+0x5/0xa [ 1350.834487] ? __alloc_file+0x21/0x320 [ 1350.834936] should_failslab+0x5/0x20 [ 1350.835372] kmem_cache_alloc+0x5b/0x310 [ 1350.835841] __alloc_file+0x21/0x320 [ 1350.836274] alloc_empty_file+0x6d/0x170 [ 1350.836728] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.837422] path_openat+0xe3/0x26f0 [ 1350.837873] ? path_lookupat+0x860/0x860 [ 1350.838343] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1350.838944] ? SOFTIRQ_verbose+0x10/0x10 [ 1350.839415] do_filp_open+0x190/0x3e0 [ 1350.839847] ? may_open_dev+0xf0/0xf0 [ 1350.840283] ? __alloc_fd+0x2b8/0x630 [ 1350.840715] ? lock_downgrade+0x6d0/0x6d0 [ 1350.841191] ? do_raw_spin_lock+0x121/0x260 [ 1350.841682] ? rwlock_bug.part.0+0x90/0x90 [ 1350.842183] ? _raw_spin_unlock+0x1a/0x30 [ 1350.842653] ? __alloc_fd+0x2b8/0x630 [ 1350.843097] do_sys_openat2+0x171/0x420 [ 1350.843545] ? __kasan_slab_free+0x122/0x160 [ 1350.844051] ? build_open_flags+0x6f0/0x6f0 [ 1350.844541] ? __x64_sys_mount+0x227/0x300 [ 1350.845028] ? kfree+0xd7/0x340 [ 1350.845420] __x64_sys_openat+0x13f/0x1f0 [ 1350.845896] ? __ia32_sys_open+0x1c0/0x1c0 [ 1350.846382] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.846981] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.847573] do_syscall_64+0x33/0x40 [ 1350.847999] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.848583] RIP: 0033:0x7ff7260faa04 [ 1350.849007] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1350.851139] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1350.851999] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1350.852814] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1350.853639] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1350.854459] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1350.855275] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 [ 1350.856627] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.857799] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.858791] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.863678] FAULT_INJECTION: forcing a failure. [ 1350.863678] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.865106] CPU: 0 PID: 10082 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1350.865892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.866846] Call Trace: [ 1350.867154] dump_stack+0x107/0x167 [ 1350.867554] should_fail.cold+0x5/0xa [ 1350.867982] should_failslab+0x5/0x20 [ 1350.868414] __kmalloc_track_caller+0x79/0x370 [ 1350.868925] ? ext4_remount+0x39c/0x26e0 [ 1350.869381] kstrdup+0x36/0x70 [ 1350.869738] ext4_remount+0x39c/0x26e0 [ 1350.870201] ? ext4_register_li_request+0x8e0/0x8e0 [ 1350.870754] ? do_raw_spin_unlock+0x4f/0x220 [ 1350.871242] ? _raw_spin_unlock+0x1a/0x30 [ 1350.871701] ? shrink_dentry_list+0x16/0x500 [ 1350.872185] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1350.872767] ? shrink_dentry_list+0x500/0x500 [ 1350.873274] ? ext4_register_li_request+0x8e0/0x8e0 [ 1350.873819] legacy_reconfigure+0x11b/0x190 [ 1350.874303] reconfigure_super+0x414/0x9c0 [ 1350.874775] ? fs_umode_to_dtype+0xb0/0xb0 [ 1350.875239] path_mount+0x1a75/0x20b0 [ 1350.875665] ? strncpy_from_user+0x9e/0x470 [ 1350.876140] ? finish_automount+0xa90/0xa90 [ 1350.876628] ? getname_flags.part.0+0x1dd/0x4f0 [ 1350.877156] __x64_sys_mount+0x282/0x300 [ 1350.877624] ? copy_mnt_ns+0xa00/0xa00 [ 1350.878055] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.878638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.879214] do_syscall_64+0x33/0x40 [ 1350.879631] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.880187] RIP: 0033:0x7f101d10c04a [ 1350.880602] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.882604] RSP: 002b:00007f101a67ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1350.883446] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d10c04a [ 1350.884250] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1350.885051] RBP: 00007f101a680040 R08: 00007f101a680040 R09: 0000000020000280 [ 1350.885844] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1350.886635] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1350.887699] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.893486] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.895175] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1350.895989] FAULT_INJECTION: forcing a failure. [ 1350.895989] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.897313] CPU: 0 PID: 10090 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1350.898092] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.898985] Call Trace: [ 1350.899281] dump_stack+0x107/0x167 [ 1350.899688] should_fail.cold+0x5/0xa [ 1350.900109] ? getname_flags.part.0+0x50/0x4f0 [ 1350.900603] should_failslab+0x5/0x20 [ 1350.901035] kmem_cache_alloc+0x5b/0x310 [ 1350.901490] ? lock_downgrade+0x6d0/0x6d0 [ 1350.901956] getname_flags.part.0+0x50/0x4f0 [ 1350.902444] getname+0x8e/0xd0 [ 1350.902815] do_sys_openat2+0xf9/0x420 [ 1350.903237] ? __kasan_slab_free+0x122/0x160 [ 1350.903727] ? build_open_flags+0x6f0/0x6f0 [ 1350.904200] ? __x64_sys_mount+0x227/0x300 [ 1350.904672] ? kfree+0xd7/0x340 [ 1350.905036] __x64_sys_openat+0x13f/0x1f0 [ 1350.905512] ? __ia32_sys_open+0x1c0/0x1c0 [ 1350.905984] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.906567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.907139] do_syscall_64+0x33/0x40 [ 1350.907559] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1350.908110] RIP: 0033:0x7f1847370a04 [ 1350.908520] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1350.910583] RSP: 002b:00007f1844911f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1350.911394] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1350.912176] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1350.912954] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1350.913741] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1350.914518] R13: 0000000020000080 R14: 00007f1844912000 R15: 0000000020000180 03:35:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 18) 03:35:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:35:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) 03:35:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) [ 1351.107791] FAULT_INJECTION: forcing a failure. [ 1351.107791] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.109038] CPU: 0 PID: 10099 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1351.109796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.110676] Call Trace: [ 1351.110964] dump_stack+0x107/0x167 [ 1351.111355] should_fail.cold+0x5/0xa [ 1351.111784] ? create_object.isra.0+0x3a/0xa20 [ 1351.112285] should_failslab+0x5/0x20 [ 1351.112689] kmem_cache_alloc+0x5b/0x310 [ 1351.113132] create_object.isra.0+0x3a/0xa20 [ 1351.113603] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1351.114145] kmem_cache_alloc_trace+0x151/0x320 [ 1351.114664] ? lockdep_init_map_type+0x2c7/0x780 [ 1351.115182] legacy_init_fs_context+0x44/0xe0 [ 1351.115660] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1351.116189] alloc_fs_context+0x4fd/0x840 [ 1351.116643] path_mount+0x931/0x20b0 [ 1351.117053] ? strncpy_from_user+0x9e/0x470 [ 1351.117540] ? finish_automount+0xa90/0xa90 [ 1351.118001] ? getname_flags.part.0+0x1dd/0x4f0 [ 1351.118522] __x64_sys_mount+0x282/0x300 [ 1351.118955] ? copy_mnt_ns+0xa00/0xa00 [ 1351.119389] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.119947] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.120528] do_syscall_64+0x33/0x40 [ 1351.120927] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1351.121510] RIP: 0033:0x7f05a88b404a [ 1351.121909] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.123948] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1351.124761] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1351.125555] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1351.126340] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1351.127126] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1351.127920] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:35:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1351.232862] FAULT_INJECTION: forcing a failure. [ 1351.232862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1351.234208] CPU: 0 PID: 10112 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1351.234943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.235833] Call Trace: [ 1351.236130] dump_stack+0x107/0x167 [ 1351.236527] should_fail.cold+0x5/0xa [ 1351.236949] strncpy_from_user+0x34/0x470 [ 1351.237416] getname_flags.part.0+0x95/0x4f0 [ 1351.237886] getname+0x8e/0xd0 [ 1351.238231] do_sys_openat2+0xf9/0x420 [ 1351.238652] ? __kasan_slab_free+0x122/0x160 [ 1351.239117] ? build_open_flags+0x6f0/0x6f0 [ 1351.239588] ? __x64_sys_mount+0x227/0x300 [ 1351.240039] ? kfree+0xd7/0x340 [ 1351.240391] __x64_sys_openat+0x13f/0x1f0 [ 1351.240834] ? __ia32_sys_open+0x1c0/0x1c0 [ 1351.241294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.241854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.242412] do_syscall_64+0x33/0x40 [ 1351.242812] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1351.243355] RIP: 0033:0x7f101d0bda04 [ 1351.243754] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1351.245733] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1351.246546] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1351.247304] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1351.248059] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1351.248824] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1351.249586] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1351.258638] FAULT_INJECTION: forcing a failure. [ 1351.258638] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.261243] CPU: 1 PID: 10113 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1351.262663] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.264378] Call Trace: [ 1351.264929] dump_stack+0x107/0x167 [ 1351.265708] should_fail.cold+0x5/0xa [ 1351.266501] ? create_object.isra.0+0x3a/0xa20 [ 1351.267477] should_failslab+0x5/0x20 [ 1351.268252] kmem_cache_alloc+0x5b/0x310 [ 1351.269111] create_object.isra.0+0x3a/0xa20 [ 1351.270009] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1351.271077] kmem_cache_alloc+0x159/0x310 [ 1351.271929] getname_flags.part.0+0x50/0x4f0 [ 1351.272945] getname+0x8e/0xd0 [ 1351.273720] do_sys_openat2+0xf9/0x420 [ 1351.274662] ? __kasan_slab_free+0x122/0x160 [ 1351.275564] ? build_open_flags+0x6f0/0x6f0 [ 1351.276537] ? __x64_sys_mount+0x227/0x300 [ 1351.277532] ? kfree+0xd7/0x340 [ 1351.278234] __x64_sys_openat+0x13f/0x1f0 [ 1351.279138] ? __ia32_sys_open+0x1c0/0x1c0 [ 1351.280101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.281303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.282460] do_syscall_64+0x33/0x40 [ 1351.283315] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1351.284533] RIP: 0033:0x7f1847370a04 [ 1351.285335] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1351.289830] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1351.291614] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1351.293216] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1351.294831] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1351.296446] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1351.298052] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1351.302586] FAULT_INJECTION: forcing a failure. [ 1351.302586] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.303842] CPU: 0 PID: 10114 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1351.304623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.305590] Call Trace: [ 1351.305896] dump_stack+0x107/0x167 [ 1351.306332] should_fail.cold+0x5/0xa [ 1351.306771] ? __alloc_file+0x21/0x320 [ 1351.307204] should_failslab+0x5/0x20 [ 1351.307624] kmem_cache_alloc+0x5b/0x310 [ 1351.308089] __alloc_file+0x21/0x320 [ 1351.308499] alloc_empty_file+0x6d/0x170 [ 1351.308966] path_openat+0xe3/0x26f0 [ 1351.309392] ? path_lookupat+0x860/0x860 [ 1351.309840] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1351.310415] ? SOFTIRQ_verbose+0x10/0x10 [ 1351.310864] do_filp_open+0x190/0x3e0 [ 1351.311288] ? may_open_dev+0xf0/0xf0 [ 1351.311714] ? __alloc_fd+0x2b8/0x630 [ 1351.312140] ? lock_downgrade+0x6d0/0x6d0 [ 1351.312604] ? do_raw_spin_lock+0x121/0x260 [ 1351.313090] ? rwlock_bug.part.0+0x90/0x90 [ 1351.313567] ? _raw_spin_unlock+0x1a/0x30 [ 1351.314039] ? __alloc_fd+0x2b8/0x630 [ 1351.314463] do_sys_openat2+0x171/0x420 [ 1351.314907] ? __kasan_slab_free+0x122/0x160 [ 1351.315394] ? build_open_flags+0x6f0/0x6f0 [ 1351.315874] ? __x64_sys_mount+0x227/0x300 [ 1351.316337] ? kfree+0xd7/0x340 [ 1351.316703] __x64_sys_openat+0x13f/0x1f0 [ 1351.317166] ? __ia32_sys_open+0x1c0/0x1c0 [ 1351.317636] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.318220] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.318786] do_syscall_64+0x33/0x40 [ 1351.319201] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1351.319767] RIP: 0033:0x7ff7260faa04 [ 1351.320191] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1351.322233] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1351.323059] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1351.323855] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1351.324643] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1351.325439] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1351.326233] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 19) 03:35:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) 03:35:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) 03:35:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:35:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1367.415710] EXT4-fs: 18 callbacks suppressed [ 1367.415723] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.425903] FAULT_INJECTION: forcing a failure. [ 1367.425903] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.426864] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.428283] CPU: 0 PID: 10134 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1367.430876] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.430896] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.432542] Call Trace: [ 1367.432565] dump_stack+0x107/0x167 [ 1367.432589] should_fail.cold+0x5/0xa [ 1367.432616] ? create_object.isra.0+0x3a/0xa20 [ 1367.436746] should_failslab+0x5/0x20 [ 1367.437537] kmem_cache_alloc+0x5b/0x310 [ 1367.438387] create_object.isra.0+0x3a/0xa20 [ 1367.438517] FAULT_INJECTION: forcing a failure. [ 1367.438517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1367.439309] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1367.439337] kmem_cache_alloc+0x159/0x310 [ 1367.443529] getname_flags.part.0+0x50/0x4f0 [ 1367.444425] getname+0x8e/0xd0 [ 1367.445081] do_sys_openat2+0xf9/0x420 [ 1367.445893] ? __kasan_slab_free+0x122/0x160 [ 1367.446790] ? build_open_flags+0x6f0/0x6f0 [ 1367.447677] ? __x64_sys_mount+0x227/0x300 [ 1367.448544] ? kfree+0xd7/0x340 [ 1367.449224] __x64_sys_openat+0x13f/0x1f0 [ 1367.450075] ? __ia32_sys_open+0x1c0/0x1c0 [ 1367.450944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.452011] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.453059] do_syscall_64+0x33/0x40 [ 1367.453836] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.454873] RIP: 0033:0x7f101d0bda04 [ 1367.455634] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1367.459387] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1367.460940] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1367.462393] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1367.463846] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1367.465310] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1367.466772] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 [ 1367.468249] CPU: 1 PID: 10138 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1367.469770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.471448] Call Trace: [ 1367.471982] dump_stack+0x107/0x167 [ 1367.472747] should_fail.cold+0x5/0xa [ 1367.473549] strncpy_from_user+0x34/0x470 [ 1367.474402] getname_flags.part.0+0x95/0x4f0 [ 1367.475447] getname+0x8e/0xd0 [ 1367.476093] do_sys_openat2+0xf9/0x420 [ 1367.476892] ? __kasan_slab_free+0x122/0x160 [ 1367.477809] ? build_open_flags+0x6f0/0x6f0 [ 1367.478699] ? __x64_sys_mount+0x227/0x300 [ 1367.479551] ? kfree+0xd7/0x340 [ 1367.480237] __x64_sys_openat+0x13f/0x1f0 [ 1367.481315] ? __ia32_sys_open+0x1c0/0x1c0 [ 1367.482185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.483254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.484301] do_syscall_64+0x33/0x40 [ 1367.485090] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.486152] RIP: 0033:0x7f1847370a04 [ 1367.486924] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1367.490635] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1367.492159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1367.493633] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1367.495074] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1367.496515] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1367.497982] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1367.508560] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.511128] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.516155] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.518087] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.520170] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.527250] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.529987] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1367.536807] FAULT_INJECTION: forcing a failure. [ 1367.536807] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.539129] CPU: 1 PID: 10140 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1367.540542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.542244] Call Trace: [ 1367.542812] dump_stack+0x107/0x167 [ 1367.543587] should_fail.cold+0x5/0xa [ 1367.544399] should_failslab+0x5/0x20 [ 1367.545182] __kmalloc_track_caller+0x79/0x370 [ 1367.546130] ? ext4_remount+0x39c/0x26e0 [ 1367.546977] kstrdup+0x36/0x70 [ 1367.547635] ext4_remount+0x39c/0x26e0 [ 1367.548454] ? ext4_register_li_request+0x8e0/0x8e0 [ 1367.549513] ? do_raw_spin_unlock+0x4f/0x220 [ 1367.550414] ? _raw_spin_unlock+0x1a/0x30 [ 1367.551267] ? shrink_dentry_list+0x16/0x500 03:35:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) [ 1367.552165] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1367.553438] ? shrink_dentry_list+0x500/0x500 [ 1367.554357] ? ext4_register_li_request+0x8e0/0x8e0 [ 1367.555395] legacy_reconfigure+0x11b/0x190 [ 1367.556276] reconfigure_super+0x414/0x9c0 [ 1367.557139] ? fs_umode_to_dtype+0xb0/0xb0 [ 1367.558311] path_mount+0x1a75/0x20b0 [ 1367.559245] ? strncpy_from_user+0x9e/0x470 [ 1367.560287] ? finish_automount+0xa90/0xa90 [ 1367.561354] ? getname_flags.part.0+0x1dd/0x4f0 [ 1367.562641] __x64_sys_mount+0x282/0x300 [ 1367.563624] ? copy_mnt_ns+0xa00/0xa00 [ 1367.564570] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.565833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.567075] do_syscall_64+0x33/0x40 [ 1367.568089] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.569539] RIP: 0033:0x7f05a88b404a [ 1367.570494] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1367.574668] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1367.576406] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1367.577989] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1367.579638] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1367.581326] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1367.582873] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:35:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) [ 1367.585006] FAULT_INJECTION: forcing a failure. [ 1367.585006] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.587323] CPU: 1 PID: 10139 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1367.588741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.590476] Call Trace: [ 1367.591093] dump_stack+0x107/0x167 [ 1367.591995] should_fail.cold+0x5/0xa [ 1367.592826] ? security_file_alloc+0x34/0x170 [ 1367.593780] should_failslab+0x5/0x20 [ 1367.594660] kmem_cache_alloc+0x5b/0x310 [ 1367.595626] security_file_alloc+0x34/0x170 [ 1367.596608] __alloc_file+0xb6/0x320 [ 1367.597523] alloc_empty_file+0x6d/0x170 [ 1367.598388] path_openat+0xe3/0x26f0 [ 1367.599265] ? path_lookupat+0x860/0x860 [ 1367.600275] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1367.601363] ? SOFTIRQ_verbose+0x10/0x10 [ 1367.602327] do_filp_open+0x190/0x3e0 [ 1367.603193] ? may_open_dev+0xf0/0xf0 [ 1367.604045] ? __alloc_fd+0x2b8/0x630 [ 1367.604940] ? lock_downgrade+0x6d0/0x6d0 [ 1367.605909] ? do_raw_spin_lock+0x121/0x260 [ 1367.606838] ? rwlock_bug.part.0+0x90/0x90 [ 1367.607820] ? _raw_spin_unlock+0x1a/0x30 [ 1367.608701] ? __alloc_fd+0x2b8/0x630 [ 1367.609577] do_sys_openat2+0x171/0x420 [ 1367.610496] ? __kasan_slab_free+0x122/0x160 [ 1367.611409] ? build_open_flags+0x6f0/0x6f0 [ 1367.612388] ? __x64_sys_mount+0x227/0x300 [ 1367.613423] ? kfree+0xd7/0x340 [ 1367.614111] __x64_sys_openat+0x13f/0x1f0 [ 1367.615022] ? __ia32_sys_open+0x1c0/0x1c0 [ 1367.616157] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.617553] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.619003] do_syscall_64+0x33/0x40 [ 1367.619906] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.621322] RIP: 0033:0x7ff7260faa04 [ 1367.622311] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1367.626657] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1367.628216] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1367.629674] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1367.631136] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1367.632587] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1367.634078] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1367.723375] FAULT_INJECTION: forcing a failure. [ 1367.723375] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.725817] CPU: 1 PID: 10147 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1367.727276] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1367.729015] Call Trace: [ 1367.729584] dump_stack+0x107/0x167 [ 1367.730348] should_fail.cold+0x5/0xa [ 1367.731148] ? __alloc_file+0x21/0x320 [ 1367.731942] should_failslab+0x5/0x20 [ 1367.732758] kmem_cache_alloc+0x5b/0x310 [ 1367.733605] __alloc_file+0x21/0x320 [ 1367.734375] alloc_empty_file+0x6d/0x170 [ 1367.735211] path_openat+0xe3/0x26f0 [ 1367.735978] ? path_lookupat+0x860/0x860 [ 1367.736847] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1367.737929] ? SOFTIRQ_verbose+0x10/0x10 [ 1367.738782] do_filp_open+0x190/0x3e0 [ 1367.739567] ? may_open_dev+0xf0/0xf0 [ 1367.740358] ? __alloc_fd+0x2b8/0x630 [ 1367.741164] ? lock_downgrade+0x6d0/0x6d0 [ 1367.742046] ? do_raw_spin_lock+0x121/0x260 [ 1367.742927] ? rwlock_bug.part.0+0x90/0x90 [ 1367.743799] ? _raw_spin_unlock+0x1a/0x30 [ 1367.744649] ? __alloc_fd+0x2b8/0x630 [ 1367.745435] do_sys_openat2+0x171/0x420 [ 1367.746252] ? __kasan_slab_free+0x122/0x160 [ 1367.747148] ? build_open_flags+0x6f0/0x6f0 [ 1367.748042] ? __x64_sys_mount+0x227/0x300 [ 1367.748902] ? kfree+0xd7/0x340 [ 1367.749603] __x64_sys_openat+0x13f/0x1f0 [ 1367.750471] ? __ia32_sys_open+0x1c0/0x1c0 [ 1367.751333] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1367.752403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1367.753471] do_syscall_64+0x33/0x40 [ 1367.754235] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1367.755297] RIP: 0033:0x7f1847370a04 [ 1367.756055] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1367.759932] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1367.761491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1367.762949] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1367.764433] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1367.765900] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1367.767345] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1368.008372] FAULT_INJECTION: forcing a failure. [ 1368.008372] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.010753] CPU: 0 PID: 10150 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1368.012209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1368.013905] Call Trace: [ 1368.014445] dump_stack+0x107/0x167 [ 1368.015194] should_fail.cold+0x5/0xa [ 1368.015995] ? create_object.isra.0+0x3a/0xa20 [ 1368.016947] should_failslab+0x5/0x20 [ 1368.017738] kmem_cache_alloc+0x5b/0x310 [ 1368.018598] create_object.isra.0+0x3a/0xa20 [ 1368.019492] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1368.020528] kmem_cache_alloc+0x159/0x310 [ 1368.021400] __alloc_file+0x21/0x320 [ 1368.022206] alloc_empty_file+0x6d/0x170 [ 1368.023036] path_openat+0xe3/0x26f0 [ 1368.023805] ? path_lookupat+0x860/0x860 [ 1368.024635] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1368.025715] ? SOFTIRQ_verbose+0x10/0x10 [ 1368.026640] do_filp_open+0x190/0x3e0 [ 1368.027415] ? may_open_dev+0xf0/0xf0 [ 1368.028197] ? __alloc_fd+0x2b8/0x630 [ 1368.028981] ? lock_downgrade+0x6d0/0x6d0 [ 1368.029847] ? do_raw_spin_lock+0x121/0x260 [ 1368.030777] ? rwlock_bug.part.0+0x90/0x90 [ 1368.031650] ? _raw_spin_unlock+0x1a/0x30 [ 1368.032488] ? __alloc_fd+0x2b8/0x630 [ 1368.033279] do_sys_openat2+0x171/0x420 [ 1368.034132] ? __kasan_slab_free+0x122/0x160 [ 1368.035036] ? build_open_flags+0x6f0/0x6f0 [ 1368.035919] ? __x64_sys_mount+0x227/0x300 [ 1368.036779] ? kfree+0xd7/0x340 [ 1368.037489] __x64_sys_openat+0x13f/0x1f0 [ 1368.038367] ? __ia32_sys_open+0x1c0/0x1c0 [ 1368.039258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1368.040329] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1368.041401] do_syscall_64+0x33/0x40 [ 1368.042170] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1368.043250] RIP: 0033:0x7f101d0bda04 [ 1368.044017] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1368.047824] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1368.049407] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1368.050860] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1368.052345] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1368.053820] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1368.055318] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:35:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) 03:35:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) 03:35:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 20) 03:35:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:35:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1381.333487] EXT4-fs: 9 callbacks suppressed [ 1381.333499] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.339382] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.342880] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.344583] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.352963] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.355248] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.357007] FAULT_INJECTION: forcing a failure. [ 1381.357007] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.359520] CPU: 1 PID: 10174 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1381.360950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.361358] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.362623] Call Trace: [ 1381.362647] dump_stack+0x107/0x167 [ 1381.362671] should_fail.cold+0x5/0xa [ 1381.362696] ? create_object.isra.0+0x3a/0xa20 [ 1381.366790] should_failslab+0x5/0x20 [ 1381.367553] kmem_cache_alloc+0x5b/0x310 [ 1381.368445] create_object.isra.0+0x3a/0xa20 [ 1381.369434] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1381.370485] kmem_cache_alloc+0x159/0x310 [ 1381.371436] __alloc_file+0x21/0x320 [ 1381.372261] alloc_empty_file+0x6d/0x170 [ 1381.373113] path_openat+0xe3/0x26f0 [ 1381.373878] ? path_lookupat+0x860/0x860 [ 1381.374748] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1381.375799] ? SOFTIRQ_verbose+0x10/0x10 [ 1381.376689] do_filp_open+0x190/0x3e0 [ 1381.377571] ? may_open_dev+0xf0/0xf0 [ 1381.378337] ? __alloc_fd+0x2b8/0x630 [ 1381.379157] ? lock_downgrade+0x6d0/0x6d0 [ 1381.379986] ? do_raw_spin_lock+0x121/0x260 [ 1381.380853] ? rwlock_bug.part.0+0x90/0x90 [ 1381.381721] ? _raw_spin_unlock+0x1a/0x30 [ 1381.382558] ? __alloc_fd+0x2b8/0x630 [ 1381.383329] do_sys_openat2+0x171/0x420 [ 1381.384121] ? __kasan_slab_free+0x122/0x160 [ 1381.384997] ? build_open_flags+0x6f0/0x6f0 [ 1381.385871] ? __x64_sys_mount+0x227/0x300 [ 1381.386714] ? kfree+0xd7/0x340 [ 1381.387380] __x64_sys_openat+0x13f/0x1f0 [ 1381.388206] ? __ia32_sys_open+0x1c0/0x1c0 [ 1381.389060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.390116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.391144] do_syscall_64+0x33/0x40 [ 1381.391892] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.392911] RIP: 0033:0x7f1847370a04 [ 1381.393660] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1381.397306] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1381.398832] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1381.400250] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1381.401678] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1381.403103] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1381.404522] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1381.406589] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.407784] FAULT_INJECTION: forcing a failure. [ 1381.407784] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.407803] CPU: 0 PID: 10173 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1381.407819] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.413020] Call Trace: [ 1381.413555] dump_stack+0x107/0x167 [ 1381.414285] should_fail.cold+0x5/0xa [ 1381.415047] ? create_object.isra.0+0x3a/0xa20 [ 1381.415960] should_failslab+0x5/0x20 [ 1381.416718] kmem_cache_alloc+0x5b/0x310 [ 1381.417552] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1381.418652] create_object.isra.0+0x3a/0xa20 [ 1381.419531] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1381.420544] kmem_cache_alloc+0x159/0x310 [ 1381.421379] security_file_alloc+0x34/0x170 [ 1381.422248] __alloc_file+0xb6/0x320 [ 1381.422994] alloc_empty_file+0x6d/0x170 [ 1381.423802] path_openat+0xe3/0x26f0 [ 1381.424553] ? path_lookupat+0x860/0x860 [ 1381.425363] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1381.426408] ? SOFTIRQ_verbose+0x10/0x10 [ 1381.427232] do_filp_open+0x190/0x3e0 [ 1381.427987] ? may_open_dev+0xf0/0xf0 [ 1381.428748] ? __alloc_fd+0x2b8/0x630 [ 1381.429524] ? lock_downgrade+0x6d0/0x6d0 [ 1381.430351] ? do_raw_spin_lock+0x121/0x260 [ 1381.431211] ? rwlock_bug.part.0+0x90/0x90 [ 1381.432062] ? _raw_spin_unlock+0x1a/0x30 [ 1381.432889] ? __alloc_fd+0x2b8/0x630 [ 1381.433666] do_sys_openat2+0x171/0x420 [ 1381.434457] ? __switch_to+0x572/0xf70 [ 1381.435230] ? __switch_to_asm+0x3a/0x60 [ 1381.436042] ? build_open_flags+0x6f0/0x6f0 [ 1381.436899] ? __schedule+0x82c/0x1ea0 [ 1381.437693] __x64_sys_openat+0x13f/0x1f0 [ 1381.438522] ? __ia32_sys_open+0x1c0/0x1c0 [ 1381.439372] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.440413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.441442] do_syscall_64+0x33/0x40 [ 1381.442204] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.443221] RIP: 0033:0x7ff7260faa04 [ 1381.443961] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1381.447612] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1381.449120] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1381.450548] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1381.451962] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1381.453373] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1381.454801] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1381.463472] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.468561] FAULT_INJECTION: forcing a failure. 03:35:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1381.468561] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.470975] CPU: 1 PID: 10177 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1381.472367] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.474174] Call Trace: [ 1381.474739] dump_stack+0x107/0x167 [ 1381.475474] should_fail.cold+0x5/0xa [ 1381.476313] ? create_object.isra.0+0x3a/0xa20 [ 1381.477353] should_failslab+0x5/0x20 [ 1381.478149] kmem_cache_alloc+0x5b/0x310 [ 1381.479045] ? mark_held_locks+0x9e/0xe0 [ 1381.479868] create_object.isra.0+0x3a/0xa20 [ 1381.480793] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1381.481952] __kmalloc_track_caller+0x177/0x370 [ 1381.482945] ? ext4_remount+0x39c/0x26e0 [ 1381.483852] kstrdup+0x36/0x70 [ 1381.484530] ext4_remount+0x39c/0x26e0 [ 1381.485397] ? ext4_register_li_request+0x8e0/0x8e0 [ 1381.486523] ? do_raw_spin_unlock+0x4f/0x220 [ 1381.487434] ? _raw_spin_unlock+0x1a/0x30 [ 1381.488342] ? shrink_dentry_list+0x16/0x500 [ 1381.489265] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1381.490386] ? shrink_dentry_list+0x500/0x500 [ 1381.491404] ? ext4_register_li_request+0x8e0/0x8e0 [ 1381.492472] legacy_reconfigure+0x11b/0x190 [ 1381.493365] reconfigure_super+0x414/0x9c0 [ 1381.494279] ? fs_umode_to_dtype+0xb0/0xb0 [ 1381.495130] path_mount+0x1a75/0x20b0 [ 1381.495897] ? strncpy_from_user+0x9e/0x470 [ 1381.496799] ? finish_automount+0xa90/0xa90 [ 1381.497753] ? getname_flags.part.0+0x1dd/0x4f0 [ 1381.498761] __x64_sys_mount+0x282/0x300 [ 1381.499625] ? copy_mnt_ns+0xa00/0xa00 [ 1381.500476] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.501601] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.502752] do_syscall_64+0x33/0x40 [ 1381.503555] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.504686] RIP: 0033:0x7f05a88b404a [ 1381.505431] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.509364] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.510958] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1381.512508] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1381.513950] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1381.515441] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1381.516942] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1381.527498] FAULT_INJECTION: forcing a failure. [ 1381.527498] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.529813] CPU: 1 PID: 10178 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1381.531202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.532858] Call Trace: [ 1381.533388] dump_stack+0x107/0x167 [ 1381.534131] should_fail.cold+0x5/0xa [ 1381.534898] ? __alloc_file+0x21/0x320 [ 1381.535680] should_failslab+0x5/0x20 [ 1381.536441] kmem_cache_alloc+0x5b/0x310 [ 1381.537267] __alloc_file+0x21/0x320 [ 1381.538039] alloc_empty_file+0x6d/0x170 [ 1381.538852] path_openat+0xe3/0x26f0 [ 1381.539607] ? path_lookupat+0x860/0x860 [ 1381.540422] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1381.541467] ? SOFTIRQ_verbose+0x10/0x10 [ 1381.542300] do_filp_open+0x190/0x3e0 [ 1381.543058] ? may_open_dev+0xf0/0xf0 [ 1381.543823] ? __alloc_fd+0x2b8/0x630 [ 1381.544153] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1381.544595] ? lock_downgrade+0x6d0/0x6d0 [ 1381.546587] ? do_raw_spin_lock+0x121/0x260 [ 1381.547452] ? rwlock_bug.part.0+0x90/0x90 [ 1381.548308] ? _raw_spin_unlock+0x1a/0x30 03:35:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) [ 1381.549134] ? __alloc_fd+0x2b8/0x630 [ 1381.550075] do_sys_openat2+0x171/0x420 [ 1381.550875] ? __kasan_slab_free+0x122/0x160 [ 1381.551753] ? build_open_flags+0x6f0/0x6f0 [ 1381.552621] ? __x64_sys_mount+0x227/0x300 [ 1381.553470] ? kfree+0xd7/0x340 [ 1381.554160] __x64_sys_openat+0x13f/0x1f0 [ 1381.554988] ? __ia32_sys_open+0x1c0/0x1c0 [ 1381.555847] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.556893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.557941] do_syscall_64+0x33/0x40 [ 1381.558685] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.559704] RIP: 0033:0x7f101d0bda04 [ 1381.560447] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 03:35:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 21) [ 1381.564120] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1381.565842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1381.567410] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1381.568911] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1381.570337] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1381.571759] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:35:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) 03:35:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) [ 1381.771319] FAULT_INJECTION: forcing a failure. [ 1381.771319] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.773715] CPU: 1 PID: 10191 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1381.775094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.776740] Call Trace: [ 1381.777273] dump_stack+0x107/0x167 [ 1381.778012] should_fail.cold+0x5/0xa [ 1381.778777] ? security_file_alloc+0x34/0x170 [ 1381.779679] should_failslab+0x5/0x20 [ 1381.780439] kmem_cache_alloc+0x5b/0x310 [ 1381.781257] security_file_alloc+0x34/0x170 [ 1381.782135] __alloc_file+0xb6/0x320 [ 1381.782881] alloc_empty_file+0x6d/0x170 [ 1381.783693] path_openat+0xe3/0x26f0 [ 1381.784446] ? path_lookupat+0x860/0x860 [ 1381.785265] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1381.786323] ? SOFTIRQ_verbose+0x10/0x10 [ 1381.787144] do_filp_open+0x190/0x3e0 [ 1381.787900] ? may_open_dev+0xf0/0xf0 [ 1381.788662] ? __alloc_fd+0x2b8/0x630 [ 1381.789421] ? lock_downgrade+0x6d0/0x6d0 [ 1381.790255] ? do_raw_spin_lock+0x121/0x260 [ 1381.791115] ? rwlock_bug.part.0+0x90/0x90 [ 1381.791970] ? _raw_spin_unlock+0x1a/0x30 [ 1381.792792] ? __alloc_fd+0x2b8/0x630 [ 1381.793575] do_sys_openat2+0x171/0x420 [ 1381.794368] ? __kasan_slab_free+0x122/0x160 [ 1381.795244] ? build_open_flags+0x6f0/0x6f0 [ 1381.796114] ? __x64_sys_mount+0x227/0x300 [ 1381.796956] ? kfree+0xd7/0x340 [ 1381.797639] __x64_sys_openat+0x13f/0x1f0 [ 1381.798467] ? __ia32_sys_open+0x1c0/0x1c0 [ 1381.799320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.800362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.801395] do_syscall_64+0x33/0x40 [ 1381.802146] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.803166] RIP: 0033:0x7f1847370a04 [ 1381.803909] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1381.807582] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1381.809096] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1381.810526] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1381.811945] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1381.813363] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1381.814793] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1381.864050] FAULT_INJECTION: forcing a failure. [ 1381.864050] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.866697] CPU: 1 PID: 10197 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1381.868085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.869752] Call Trace: [ 1381.870283] dump_stack+0x107/0x167 [ 1381.871019] should_fail.cold+0x5/0xa [ 1381.871790] should_failslab+0x5/0x20 [ 1381.872557] __kmalloc_track_caller+0x79/0x370 [ 1381.873469] ? ext4_remount+0x39c/0x26e0 [ 1381.874300] kstrdup+0x36/0x70 [ 1381.874946] ext4_remount+0x39c/0x26e0 [ 1381.875757] ? ext4_register_li_request+0x8e0/0x8e0 [ 1381.876756] ? _cond_resched+0x12/0x80 [ 1381.877556] ? shrink_dentry_list+0x134/0x500 [ 1381.878453] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1381.879497] ? shrink_dentry_list+0x500/0x500 [ 1381.880403] ? ext4_register_li_request+0x8e0/0x8e0 [ 1381.881401] legacy_reconfigure+0x11b/0x190 [ 1381.882270] reconfigure_super+0x414/0x9c0 [ 1381.883118] ? fs_umode_to_dtype+0xb0/0xb0 [ 1381.883970] path_mount+0x1a75/0x20b0 [ 1381.884737] ? strncpy_from_user+0x9e/0x470 [ 1381.885622] ? finish_automount+0xa90/0xa90 [ 1381.886484] ? getname_flags.part.0+0x1dd/0x4f0 [ 1381.887429] __x64_sys_mount+0x282/0x300 [ 1381.888244] ? copy_mnt_ns+0xa00/0xa00 [ 1381.889028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.890080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.891116] do_syscall_64+0x33/0x40 [ 1381.891863] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.892885] RIP: 0033:0x7f05a88b404a [ 1381.893637] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.897306] RSP: 002b:00007f05a5e27fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.898840] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88b404a [ 1381.900263] RDX: 0000000020000280 RSI: 0000000020000080 RDI: 0000000000000000 [ 1381.901692] RBP: 00007f05a5e28040 R08: 00007f05a5e28040 R09: 0000000020000280 [ 1381.903115] R10: 0000000002044034 R11: 0000000000000206 R12: 0000000020000280 [ 1381.904559] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1381.914138] FAULT_INJECTION: forcing a failure. [ 1381.914138] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.916420] CPU: 0 PID: 10196 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1381.917817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.919477] Call Trace: [ 1381.920008] dump_stack+0x107/0x167 [ 1381.920746] should_fail.cold+0x5/0xa [ 1381.921533] ? security_file_alloc+0x34/0x170 [ 1381.922438] should_failslab+0x5/0x20 [ 1381.923202] kmem_cache_alloc+0x5b/0x310 [ 1381.924026] security_file_alloc+0x34/0x170 [ 1381.924896] __alloc_file+0xb6/0x320 [ 1381.925655] alloc_empty_file+0x6d/0x170 [ 1381.926471] path_openat+0xe3/0x26f0 [ 1381.927229] ? path_lookupat+0x860/0x860 [ 1381.928046] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1381.929095] ? SOFTIRQ_verbose+0x10/0x10 [ 1381.929944] do_filp_open+0x190/0x3e0 [ 1381.930706] ? may_open_dev+0xf0/0xf0 [ 1381.931474] ? __alloc_fd+0x2b8/0x630 [ 1381.932238] ? lock_downgrade+0x6d0/0x6d0 [ 1381.933070] ? do_raw_spin_lock+0x121/0x260 [ 1381.933942] ? rwlock_bug.part.0+0x90/0x90 [ 1381.934801] ? _raw_spin_unlock+0x1a/0x30 [ 1381.935627] ? __alloc_fd+0x2b8/0x630 [ 1381.936400] do_sys_openat2+0x171/0x420 [ 1381.937195] ? __kasan_slab_free+0x122/0x160 [ 1381.938081] ? build_open_flags+0x6f0/0x6f0 [ 1381.938950] ? __x64_sys_mount+0x227/0x300 [ 1381.939796] ? kfree+0xd7/0x340 [ 1381.940462] __x64_sys_openat+0x13f/0x1f0 [ 1381.941291] ? __ia32_sys_open+0x1c0/0x1c0 [ 1381.942162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.943210] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.944249] do_syscall_64+0x33/0x40 [ 1381.945000] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1381.946032] RIP: 0033:0x7ff7260faa04 [ 1381.946778] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1381.950456] RSP: 002b:00007ff7236bcf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1381.951977] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260faa04 [ 1381.953402] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1381.954841] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1381.956266] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1381.957699] R13: 0000000020000080 R14: 00007ff7236bd000 R15: 0000000020000180 03:35:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:35:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1382.006592] FAULT_INJECTION: forcing a failure. [ 1382.006592] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.008886] CPU: 1 PID: 10205 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1382.010284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1382.011952] Call Trace: [ 1382.012487] dump_stack+0x107/0x167 [ 1382.013227] should_fail.cold+0x5/0xa [ 1382.014012] ? create_object.isra.0+0x3a/0xa20 [ 1382.014933] should_failslab+0x5/0x20 [ 1382.015699] kmem_cache_alloc+0x5b/0x310 [ 1382.016516] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1382.017633] create_object.isra.0+0x3a/0xa20 [ 1382.018517] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1382.019541] kmem_cache_alloc+0x159/0x310 [ 1382.020384] security_file_alloc+0x34/0x170 [ 1382.021254] __alloc_file+0xb6/0x320 [ 1382.022026] alloc_empty_file+0x6d/0x170 [ 1382.022844] path_openat+0xe3/0x26f0 [ 1382.023604] ? path_lookupat+0x860/0x860 [ 1382.024425] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1382.025475] ? SOFTIRQ_verbose+0x10/0x10 [ 1382.026314] do_filp_open+0x190/0x3e0 [ 1382.027078] ? may_open_dev+0xf0/0xf0 [ 1382.027848] ? __alloc_fd+0x2b8/0x630 [ 1382.028613] ? lock_downgrade+0x6d0/0x6d0 [ 1382.029447] ? do_raw_spin_lock+0x121/0x260 [ 1382.030324] ? rwlock_bug.part.0+0x90/0x90 [ 1382.031185] ? _raw_spin_unlock+0x1a/0x30 [ 1382.032016] ? __alloc_fd+0x2b8/0x630 [ 1382.032793] do_sys_openat2+0x171/0x420 [ 1382.033618] ? __kasan_slab_free+0x122/0x160 [ 1382.034501] ? build_open_flags+0x6f0/0x6f0 [ 1382.035374] ? __x64_sys_mount+0x227/0x300 [ 1382.036221] ? kfree+0xd7/0x340 [ 1382.036895] __x64_sys_openat+0x13f/0x1f0 [ 1382.037738] ? __ia32_sys_open+0x1c0/0x1c0 [ 1382.038596] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1382.039647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1382.040703] do_syscall_64+0x33/0x40 [ 1382.041454] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1382.042491] RIP: 0033:0x7f101d0bda04 [ 1382.043240] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1382.046943] RSP: 002b:00007f101a67ff30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1382.048465] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f101d0bda04 [ 1382.049897] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1382.051324] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1382.052749] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1382.054181] R13: 0000000020000080 R14: 00007f101a680000 R15: 0000000020000180 03:36:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) 03:36:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 29) 03:36:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 22) 03:36:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) [ 1395.967321] EXT4-fs: 19 callbacks suppressed [ 1395.967335] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.969762] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.971817] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.974359] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.976309] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.977648] FAULT_INJECTION: forcing a failure. [ 1395.977648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.978781] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.979426] CPU: 0 PID: 10228 Comm: syz-executor.4 Not tainted 5.10.202 #1 [ 1395.980987] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.981442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.981452] Call Trace: [ 1395.983421] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.983622] dump_stack+0x107/0x167 [ 1395.984626] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1395.984788] should_fail.cold+0x5/0xa [ 1395.984805] _copy_from_user+0x2e/0x1b0 [ 1395.984819] kstrtouint_from_user+0xbd/0x220 [ 1395.984835] ? kstrtou8_from_user+0x210/0x210 [ 1395.986920] FAULT_INJECTION: forcing a failure. [ 1395.986920] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.987073] ? lock_acquire+0x197/0x470 [ 1395.990132] ? ksys_write+0x12d/0x260 [ 1395.990630] proc_fail_nth_write+0x78/0x220 [ 1395.991135] ? proc_task_getattr+0x1f0/0x1f0 [ 1395.991654] ? __fget_files+0x296/0x4c0 [ 1395.992127] ? proc_task_getattr+0x1f0/0x1f0 [ 1395.992617] vfs_write+0x29a/0xa70 [ 1395.993032] ksys_write+0x12d/0x260 [ 1395.993438] ? __ia32_sys_read+0xb0/0xb0 [ 1395.993934] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1395.994536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1395.995157] do_syscall_64+0x33/0x40 [ 1395.995592] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1395.996187] RIP: 0033:0x7ff7260fa5ff [ 1395.996623] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1395.998783] RSP: 002b:00007ff7236bd170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1395.999661] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff7260fa5ff [ 1396.000469] RDX: 0000000000000001 RSI: 00007ff7236bd1e0 RDI: 0000000000000003 [ 1396.001286] RBP: 00007ff7236bd1d0 R08: 0000000000000000 R09: 0000000020000280 [ 1396.002112] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1396.002925] R13: 00007ffdbdd50cdf R14: 00007ff7236bd300 R15: 0000000000022000 [ 1396.003802] CPU: 1 PID: 10223 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1396.005368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.007248] Call Trace: [ 1396.007842] dump_stack+0x107/0x167 [ 1396.008770] should_fail.cold+0x5/0xa [ 1396.009715] ? create_object.isra.0+0x3a/0xa20 [ 1396.010582] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1396.010750] should_failslab+0x5/0x20 [ 1396.010772] kmem_cache_alloc+0x5b/0x310 [ 1396.011498] FAULT_INJECTION: forcing a failure. [ 1396.011498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1396.012242] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1396.012266] create_object.isra.0+0x3a/0xa20 [ 1396.017399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1396.018558] kmem_cache_alloc+0x159/0x310 [ 1396.019501] security_file_alloc+0x34/0x170 [ 1396.020484] __alloc_file+0xb6/0x320 [ 1396.021321] alloc_empty_file+0x6d/0x170 [ 1396.022259] path_openat+0xe3/0x26f0 [ 1396.023110] ? path_lookupat+0x860/0x860 [ 1396.024031] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1396.025200] ? SOFTIRQ_verbose+0x10/0x10 [ 1396.026141] do_filp_open+0x190/0x3e0 [ 1396.026987] ? may_open_dev+0xf0/0xf0 [ 1396.027844] ? __alloc_fd+0x2b8/0x630 [ 1396.028692] ? lock_downgrade+0x6d0/0x6d0 [ 1396.029624] ? do_raw_spin_lock+0x121/0x260 [ 1396.030594] ? rwlock_bug.part.0+0x90/0x90 [ 1396.031541] ? _raw_spin_unlock+0x1a/0x30 [ 1396.032467] ? __alloc_fd+0x2b8/0x630 [ 1396.033323] do_sys_openat2+0x171/0x420 [ 1396.034231] ? __kasan_slab_free+0x122/0x160 [ 1396.035204] ? build_open_flags+0x6f0/0x6f0 [ 1396.036173] ? __x64_sys_mount+0x227/0x300 [ 1396.037108] ? kfree+0xd7/0x340 [ 1396.037870] __x64_sys_openat+0x13f/0x1f0 [ 1396.038789] ? __ia32_sys_open+0x1c0/0x1c0 [ 1396.039744] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.040903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.042077] do_syscall_64+0x33/0x40 [ 1396.042907] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1396.044047] RIP: 0033:0x7f1847370a04 [ 1396.044875] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1396.048953] RSP: 002b:00007f1844932f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1396.050651] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1847370a04 [ 1396.052226] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1396.053804] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1396.055375] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1396.056950] R13: 0000000020000080 R14: 00007f1844933000 R15: 0000000020000180 [ 1396.058552] CPU: 0 PID: 10229 Comm: syz-executor.5 Not tainted 5.10.202 #1 [ 1396.059326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.060244] Call Trace: [ 1396.060556] dump_stack+0x107/0x167 [ 1396.060969] should_fail.cold+0x5/0xa [ 1396.061397] _copy_to_user+0x2e/0x180 [ 1396.061908] simple_read_from_buffer+0xcc/0x160 [ 1396.062425] proc_fail_nth_read+0x198/0x230 [ 1396.062923] ? proc_sessionid_read+0x230/0x230 [ 1396.063398] FAULT_INJECTION: forcing a failure. [ 1396.063398] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.063423] ? security_file_permission+0x24e/0x570 [ 1396.063433] ? perf_trace_initcall_start+0x101/0x380 [ 1396.063450] ? proc_sessionid_read+0x230/0x230 [ 1396.067466] vfs_read+0x228/0x580 [ 1396.067867] ksys_read+0x12d/0x260 [ 1396.068263] ? vfs_write+0xa70/0xa70 [ 1396.068675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.069249] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.069840] do_syscall_64+0x33/0x40 [ 1396.070250] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1396.070812] RIP: 0033:0x7f101d0bd69c [ 1396.071214] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1396.073201] RSP: 002b:00007f101a680170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.074031] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f101d0bd69c [ 1396.074801] RDX: 000000000000000f RSI: 00007f101a6801e0 RDI: 0000000000000003 [ 1396.075566] RBP: 00007f101a6801d0 R08: 0000000000000000 R09: 0000000020000280 [ 1396.076328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.077088] R13: 00007ffe30ff609f R14: 00007f101a680300 R15: 0000000000022000 [ 1396.077896] CPU: 1 PID: 10224 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1396.079429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.081252] Call Trace: [ 1396.081836] dump_stack+0x107/0x167 [ 1396.082641] should_fail.cold+0x5/0xa [ 1396.083470] ? create_object.isra.0+0x3a/0xa20 [ 1396.084464] should_failslab+0x5/0x20 [ 1396.085294] kmem_cache_alloc+0x5b/0x310 [ 1396.086199] create_object.isra.0+0x3a/0xa20 [ 1396.087167] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1396.088279] kmem_cache_alloc+0x159/0x310 [ 1396.089191] getname_flags.part.0+0x50/0x4f0 [ 1396.090164] getname+0x8e/0xd0 [ 1396.090871] do_sys_openat2+0xf9/0x420 [ 1396.091724] ? __kasan_slab_free+0x122/0x160 [ 1396.092687] ? build_open_flags+0x6f0/0x6f0 [ 1396.093644] ? __x64_sys_mount+0x227/0x300 [ 1396.094588] ? kfree+0xd7/0x340 [ 1396.095315] __x64_sys_openat+0x13f/0x1f0 [ 1396.096228] ? __ia32_sys_open+0x1c0/0x1c0 [ 1396.097162] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.098324] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.099446] do_syscall_64+0x33/0x40 [ 1396.100261] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1396.101376] RIP: 0033:0x7f05a8865a04 [ 1396.102195] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1396.106185] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1396.107831] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1396.109399] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1396.110946] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1396.112482] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1396.114015] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:36:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) 03:36:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1396.324788] FAULT_INJECTION: forcing a failure. [ 1396.324788] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1396.326204] CPU: 1 PID: 10246 Comm: syz-executor.3 Not tainted 5.10.202 #1 [ 1396.326963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.327869] Call Trace: [ 1396.328172] dump_stack+0x107/0x167 [ 1396.328650] should_fail.cold+0x5/0xa [ 1396.329126] _copy_to_user+0x2e/0x180 [ 1396.329718] simple_read_from_buffer+0xcc/0x160 [ 1396.330285] proc_fail_nth_read+0x198/0x230 [ 1396.330744] ? proc_sessionid_read+0x230/0x230 [ 1396.331349] ? security_file_permission+0x24e/0x570 [ 1396.331955] ? perf_trace_initcall_start+0x101/0x380 [ 1396.332654] ? proc_sessionid_read+0x230/0x230 [ 1396.333141] vfs_read+0x228/0x580 [ 1396.333528] ksys_read+0x12d/0x260 [ 1396.334025] ? vfs_write+0xa70/0xa70 [ 1396.334471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.335185] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.335763] do_syscall_64+0x33/0x40 [ 1396.336169] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1396.336742] RIP: 0033:0x7f184737069c [ 1396.337220] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1396.339480] RSP: 002b:00007f1844933170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1396.340293] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f184737069c [ 1396.341073] RDX: 000000000000000f RSI: 00007f18449331e0 RDI: 0000000000000003 [ 1396.341861] RBP: 00007f18449331d0 R08: 0000000000000000 R09: 0000000020000280 [ 1396.342640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1396.343422] R13: 00007ffc2656742f R14: 00007f1844933300 R15: 0000000000022000 03:36:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 23) 03:36:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1408.981098] EXT4-fs: 12 callbacks suppressed [ 1408.981112] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1408.983986] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1408.991988] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1408.993117] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1408.994962] FAULT_INJECTION: forcing a failure. [ 1408.994962] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1408.996774] CPU: 0 PID: 10268 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1408.996971] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1408.997835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1408.997841] Call Trace: [ 1408.997879] dump_stack+0x107/0x167 [ 1408.997899] should_fail.cold+0x5/0xa [ 1408.997924] strncpy_from_user+0x34/0x470 [ 1409.000110] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1409.000212] getname_flags.part.0+0x95/0x4f0 [ 1409.001036] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1409.001213] getname+0x8e/0xd0 [ 1409.003876] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1409.004462] do_sys_openat2+0xf9/0x420 [ 1409.006328] ? __kasan_slab_free+0x122/0x160 [ 1409.006860] ? build_open_flags+0x6f0/0x6f0 [ 1409.007386] ? __x64_sys_mount+0x227/0x300 [ 1409.007897] ? kfree+0xd7/0x340 [ 1409.008302] __x64_sys_openat+0x13f/0x1f0 [ 1409.008426] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1409.008827] ? __ia32_sys_open+0x1c0/0x1c0 [ 1409.008846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1409.008858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1409.008874] do_syscall_64+0x33/0x40 [ 1409.008887] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1409.008905] RIP: 0033:0x7f05a8865a04 [ 1409.013489] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1409.015779] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1409.016725] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1409.017612] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1409.018499] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1409.019381] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1409.020261] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1409.022451] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:36:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 24) 03:36:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1409.195239] FAULT_INJECTION: forcing a failure. [ 1409.195239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1409.196606] CPU: 0 PID: 10279 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1409.197415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1409.198400] Call Trace: [ 1409.198720] dump_stack+0x107/0x167 [ 1409.199166] should_fail.cold+0x5/0xa [ 1409.199609] strncpy_from_user+0x34/0x470 [ 1409.200097] getname_flags.part.0+0x95/0x4f0 [ 1409.200601] getname+0x8e/0xd0 [ 1409.200974] do_sys_openat2+0xf9/0x420 [ 1409.201438] ? __kasan_slab_free+0x122/0x160 [ 1409.201960] ? build_open_flags+0x6f0/0x6f0 [ 1409.202452] ? __x64_sys_mount+0x227/0x300 [ 1409.202996] ? kfree+0xd7/0x340 [ 1409.203500] __x64_sys_openat+0x13f/0x1f0 [ 1409.204146] ? __ia32_sys_open+0x1c0/0x1c0 [ 1409.204786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1409.205575] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1409.206383] do_syscall_64+0x33/0x40 [ 1409.206953] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1409.207869] RIP: 0033:0x7f05a8865a04 [ 1409.208428] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1409.211134] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1409.212021] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1409.212829] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1409.213638] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1409.214477] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1409.215337] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:36:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 25) 03:36:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1423.732842] EXT4-fs: 18 callbacks suppressed [ 1423.732855] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.735292] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.738826] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.740620] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.743186] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.744581] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.748192] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.753206] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.754731] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.756084] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1423.764480] FAULT_INJECTION: forcing a failure. [ 1423.764480] name failslab, interval 1, probability 0, space 0, times 0 [ 1423.767002] CPU: 1 PID: 10320 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1423.768532] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1423.770343] Call Trace: [ 1423.770945] dump_stack+0x107/0x167 [ 1423.771684] should_fail.cold+0x5/0xa [ 1423.772522] ? create_object.isra.0+0x3a/0xa20 [ 1423.773574] should_failslab+0x5/0x20 [ 1423.774363] kmem_cache_alloc+0x5b/0x310 [ 1423.775206] create_object.isra.0+0x3a/0xa20 [ 1423.776098] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1423.777153] kmem_cache_alloc+0x159/0x310 [ 1423.778004] __alloc_file+0x21/0x320 [ 1423.778792] alloc_empty_file+0x6d/0x170 [ 1423.779618] path_openat+0xe3/0x26f0 [ 1423.780395] ? path_lookupat+0x860/0x860 [ 1423.781226] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1423.782327] ? SOFTIRQ_verbose+0x10/0x10 [ 1423.783183] do_filp_open+0x190/0x3e0 [ 1423.783952] ? may_open_dev+0xf0/0xf0 [ 1423.784729] ? __alloc_fd+0x2b8/0x630 [ 1423.785502] ? lock_downgrade+0x6d0/0x6d0 [ 1423.786353] ? do_raw_spin_lock+0x121/0x260 [ 1423.787231] ? rwlock_bug.part.0+0x90/0x90 [ 1423.788101] ? _raw_spin_unlock+0x1a/0x30 [ 1423.788944] ? __alloc_fd+0x2b8/0x630 [ 1423.789728] do_sys_openat2+0x171/0x420 [ 1423.790553] ? __kasan_slab_free+0x122/0x160 [ 1423.791446] ? build_open_flags+0x6f0/0x6f0 [ 1423.792324] ? __x64_sys_mount+0x227/0x300 [ 1423.793178] ? kfree+0xd7/0x340 [ 1423.793856] __x64_sys_openat+0x13f/0x1f0 [ 1423.794701] ? __ia32_sys_open+0x1c0/0x1c0 [ 1423.795564] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1423.796624] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1423.797677] do_syscall_64+0x33/0x40 [ 1423.798439] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1423.799472] RIP: 0033:0x7f05a8865a04 [ 1423.800224] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1423.803949] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1423.805489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1423.806945] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1423.808384] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1423.809829] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1423.811283] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:36:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 26) 03:36:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1424.163257] FAULT_INJECTION: forcing a failure. [ 1424.163257] name failslab, interval 1, probability 0, space 0, times 0 [ 1424.165731] CPU: 1 PID: 10349 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1424.167128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1424.168788] Call Trace: [ 1424.169324] dump_stack+0x107/0x167 [ 1424.170076] should_fail.cold+0x5/0xa [ 1424.170846] ? create_object.isra.0+0x3a/0xa20 [ 1424.171776] should_failslab+0x5/0x20 [ 1424.172561] kmem_cache_alloc+0x5b/0x310 [ 1424.173390] create_object.isra.0+0x3a/0xa20 [ 1424.174305] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1424.175348] kmem_cache_alloc+0x159/0x310 [ 1424.176203] __alloc_file+0x21/0x320 [ 1424.176971] alloc_empty_file+0x6d/0x170 [ 1424.177803] path_openat+0xe3/0x26f0 [ 1424.178589] ? path_lookupat+0x860/0x860 [ 1424.179420] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1424.180491] ? SOFTIRQ_verbose+0x10/0x10 [ 1424.181331] do_filp_open+0x190/0x3e0 [ 1424.182118] ? may_open_dev+0xf0/0xf0 [ 1424.182900] ? __alloc_fd+0x2b8/0x630 [ 1424.183681] ? lock_downgrade+0x6d0/0x6d0 [ 1424.184530] ? do_raw_spin_lock+0x121/0x260 [ 1424.185414] ? rwlock_bug.part.0+0x90/0x90 [ 1424.186302] ? _raw_spin_unlock+0x1a/0x30 [ 1424.187171] ? __alloc_fd+0x2b8/0x630 [ 1424.187955] do_sys_openat2+0x171/0x420 [ 1424.188774] ? __kasan_slab_free+0x122/0x160 [ 1424.189675] ? build_open_flags+0x6f0/0x6f0 [ 1424.190577] ? __x64_sys_mount+0x227/0x300 [ 1424.191444] ? kfree+0xd7/0x340 [ 1424.192125] __x64_sys_openat+0x13f/0x1f0 [ 1424.192976] ? __ia32_sys_open+0x1c0/0x1c0 [ 1424.193856] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1424.194933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1424.195999] do_syscall_64+0x33/0x40 [ 1424.196777] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1424.197825] RIP: 0033:0x7f05a8865a04 [ 1424.198602] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1424.202387] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1424.203943] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1424.205408] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1424.206870] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1424.208300] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1424.209725] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 03:36:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x178c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 27) 03:36:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1440.823397] EXT4-fs: 24 callbacks suppressed [ 1440.823410] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.830946] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.834993] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.836432] FAULT_INJECTION: forcing a failure. [ 1440.836432] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.838925] CPU: 1 PID: 10369 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1440.840292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.842023] Call Trace: [ 1440.842569] dump_stack+0x107/0x167 [ 1440.843389] should_fail.cold+0x5/0xa [ 1440.843414] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.844177] ? create_object.isra.0+0x3a/0xa20 [ 1440.844200] should_failslab+0x5/0x20 [ 1440.844219] kmem_cache_alloc+0x5b/0x310 [ 1440.844244] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1440.847296] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.847957] create_object.isra.0+0x3a/0xa20 [ 1440.847976] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1440.848000] kmem_cache_alloc+0x159/0x310 [ 1440.853218] security_file_alloc+0x34/0x170 [ 1440.854166] __alloc_file+0xb6/0x320 [ 1440.855000] alloc_empty_file+0x6d/0x170 [ 1440.855913] path_openat+0xe3/0x26f0 [ 1440.856719] ? path_lookupat+0x860/0x860 [ 1440.857625] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1440.858739] ? SOFTIRQ_verbose+0x10/0x10 [ 1440.859665] do_filp_open+0x190/0x3e0 [ 1440.860469] ? may_open_dev+0xf0/0xf0 [ 1440.861313] ? __alloc_fd+0x2b8/0x630 [ 1440.862148] ? lock_downgrade+0x6d0/0x6d0 [ 1440.863080] ? do_raw_spin_lock+0x121/0x260 [ 1440.864019] ? rwlock_bug.part.0+0x90/0x90 [ 1440.865025] ? _raw_spin_unlock+0x1a/0x30 [ 1440.865899] ? __alloc_fd+0x2b8/0x630 [ 1440.866693] do_sys_openat2+0x171/0x420 [ 1440.867501] ? __kasan_slab_free+0x122/0x160 [ 1440.868397] ? build_open_flags+0x6f0/0x6f0 [ 1440.869279] ? __x64_sys_mount+0x227/0x300 [ 1440.870139] ? kfree+0xd7/0x340 [ 1440.870824] __x64_sys_openat+0x13f/0x1f0 [ 1440.871666] ? __ia32_sys_open+0x1c0/0x1c0 [ 1440.872538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1440.873602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1440.874672] do_syscall_64+0x33/0x40 [ 1440.875436] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1440.876477] RIP: 0033:0x7f05a8865a04 [ 1440.877240] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1440.880992] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1440.882557] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1440.884006] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1440.885456] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1440.886918] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1440.888366] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1440.891033] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.893683] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.898235] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.899762] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1440.902494] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:36:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:36:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x17b5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 28) 03:37:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1455.317071] EXT4-fs: 15 callbacks suppressed [ 1455.317085] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.321093] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.326462] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.328112] FAULT_INJECTION: forcing a failure. [ 1455.328112] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.329544] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.330427] CPU: 0 PID: 10411 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1455.332931] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.332942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.332957] Call Trace: [ 1455.336035] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.336347] dump_stack+0x107/0x167 [ 1455.338279] should_fail.cold+0x5/0xa [ 1455.339022] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.339055] ? security_file_alloc+0x34/0x170 [ 1455.341148] should_failslab+0x5/0x20 [ 1455.341909] kmem_cache_alloc+0x5b/0x310 [ 1455.342745] security_file_alloc+0x34/0x170 [ 1455.343614] __alloc_file+0xb6/0x320 [ 1455.344354] alloc_empty_file+0x6d/0x170 [ 1455.345156] path_openat+0xe3/0x26f0 [ 1455.345906] ? path_lookupat+0x860/0x860 [ 1455.346722] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1455.347276] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.347751] ? SOFTIRQ_verbose+0x10/0x10 [ 1455.347782] do_filp_open+0x190/0x3e0 [ 1455.347802] ? may_open_dev+0xf0/0xf0 [ 1455.350510] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1455.350558] ? __alloc_fd+0x2b8/0x630 [ 1455.353218] ? lock_downgrade+0x6d0/0x6d0 [ 1455.354038] ? do_raw_spin_lock+0x121/0x260 [ 1455.354909] ? rwlock_bug.part.0+0x90/0x90 [ 1455.355767] ? _raw_spin_unlock+0x1a/0x30 [ 1455.356585] ? __alloc_fd+0x2b8/0x630 [ 1455.357354] do_sys_openat2+0x171/0x420 [ 1455.358146] ? __kasan_slab_free+0x122/0x160 [ 1455.359028] ? build_open_flags+0x6f0/0x6f0 [ 1455.359891] ? __x64_sys_mount+0x227/0x300 [ 1455.360730] ? kfree+0xd7/0x340 [ 1455.361389] __x64_sys_openat+0x13f/0x1f0 [ 1455.362217] ? __ia32_sys_open+0x1c0/0x1c0 [ 1455.363076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1455.364114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1455.365149] do_syscall_64+0x33/0x40 [ 1455.365888] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1455.366904] RIP: 0033:0x7f05a8865a04 [ 1455.367699] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1455.371580] RSP: 002b:00007f05a5e27f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1455.373176] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a8865a04 [ 1455.374688] RDX: 0000000000010000 RSI: 0000000020000080 RDI: 00000000ffffff9c [ 1455.376185] RBP: 0000000020000080 R08: 0000000000000000 R09: 0000000020000280 [ 1455.377686] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1455.379201] R13: 0000000020000080 R14: 00007f05a5e28000 R15: 0000000020000180 [ 1455.388278] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:37:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) (fail_nth: 29) 03:37:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1455.701642] FAULT_INJECTION: forcing a failure. [ 1455.701642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1455.704186] CPU: 0 PID: 10447 Comm: syz-executor.2 Not tainted 5.10.202 #1 [ 1455.705588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.707262] Call Trace: [ 1455.707812] dump_stack+0x107/0x167 [ 1455.708579] should_fail.cold+0x5/0xa [ 1455.709452] _copy_from_user+0x2e/0x1b0 [ 1455.710352] kstrtouint_from_user+0xbd/0x220 [ 1455.711365] ? kstrtou8_from_user+0x210/0x210 [ 1455.712486] ? lock_acquire+0x197/0x470 [ 1455.713294] ? ksys_write+0x12d/0x260 [ 1455.714233] proc_fail_nth_write+0x78/0x220 [ 1455.715120] ? proc_task_getattr+0x1f0/0x1f0 [ 1455.716190] ? __fget_files+0x296/0x4c0 [ 1455.717005] ? proc_task_getattr+0x1f0/0x1f0 [ 1455.718067] vfs_write+0x29a/0xa70 [ 1455.718823] ksys_write+0x12d/0x260 [ 1455.719717] ? __ia32_sys_read+0xb0/0xb0 [ 1455.720540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1455.721820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1455.722877] do_syscall_64+0x33/0x40 [ 1455.723726] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1455.724750] RIP: 0033:0x7f05a88655ff [ 1455.725488] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1455.729143] RSP: 002b:00007f05a5e28170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1455.730655] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f05a88655ff [ 1455.732073] RDX: 0000000000000001 RSI: 00007f05a5e281e0 RDI: 0000000000000003 [ 1455.733485] RBP: 00007f05a5e281d0 R08: 0000000000000000 R09: 0000000020000280 [ 1455.734910] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1455.736321] R13: 00007ffd7d60ceff R14: 00007f05a5e28300 R15: 0000000000022000 03:37:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8c17, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1471.482975] EXT4-fs: 26 callbacks suppressed [ 1471.482989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.490167] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.491984] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.495852] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.501615] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.503556] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.505526] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.508639] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.511243] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1471.513498] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:37:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb517, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1486.078320] EXT4-fs: 19 callbacks suppressed [ 1486.078330] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.083443] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.086070] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.092286] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.093629] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.095198] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.099399] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.106730] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.107818] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1486.109298] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:37:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1499.475742] EXT4-fs: 26 callbacks suppressed [ 1499.475759] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.486206] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.488145] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.492523] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.494329] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.498575] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.502993] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.508551] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.510989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1499.512502] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:37:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:37:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1514.611453] EXT4-fs: 10 callbacks suppressed [ 1514.611461] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.619765] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.621278] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.622850] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.625892] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.626831] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.628440] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.629964] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.632624] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1514.636438] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:38:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1a2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1529.584851] EXT4-fs: 28 callbacks suppressed [ 1529.585367] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.589543] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.591357] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.596078] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.599739] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.602050] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.603154] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.605171] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.606373] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1529.613123] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:38:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e1a, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1543.984583] EXT4-fs: 24 callbacks suppressed [ 1543.984597] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1543.996051] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.005209] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.007561] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.010583] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.015140] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.017599] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.019238] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.022782] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1544.028069] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:38:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1557.052226] EXT4-fs: 22 callbacks suppressed [ 1557.052237] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.062256] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.070140] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.076526] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.079203] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.084058] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.086236] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.089776] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.092013] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1557.094161] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:38:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1edf, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:38:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1572.713525] EXT4-fs: 22 callbacks suppressed [ 1572.713541] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.721857] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.735009] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.742221] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.750143] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:39:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1572.754918] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.765160] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.768857] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.771464] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1572.773950] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:39:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xdf1e, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1587.329576] EXT4-fs: 22 callbacks suppressed [ 1587.329592] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.334016] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.341647] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.344031] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.346646] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.348363] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.351441] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.353506] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.356332] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1587.358320] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:39:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1603.745826] EXT4-fs: 22 callbacks suppressed [ 1603.745840] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.748353] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.750211] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.753390] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.758172] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.768342] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.774974] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.780144] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.782094] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1603.784291] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:39:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8c170000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb5170000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1617.928582] EXT4-fs: 22 callbacks suppressed [ 1617.928595] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.937882] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.940529] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.943471] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.947050] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.951575] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.953334] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.955133] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.958814] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1617.962306] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:39:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:39:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffe000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffe000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1632.824225] EXT4-fs: 22 callbacks suppressed [ 1632.824238] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.828202] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.830189] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.834968] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.837604] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.841997] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.843686] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.845430] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.848150] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1632.855923] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:40:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x80000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1647.116420] EXT4-fs: 32 callbacks suppressed [ 1647.116434] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.132427] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.138097] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.142955] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.144919] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.146478] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.148424] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.153482] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.155434] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1647.157598] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:40:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x3000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1664.402375] EXT4-fs: 18 callbacks suppressed [ 1664.402387] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.408528] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.412233] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.414248] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.415942] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.417499] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.418782] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.420283] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.421751] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1664.423176] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:40:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e1a0000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1680.368828] EXT4-fs: 8 callbacks suppressed [ 1680.368841] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.374645] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.381794] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.385182] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.388386] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.391002] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.394431] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.395945] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.397798] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1680.407059] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:40:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x5000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x6000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:40:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x7000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:12 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1695.457025] EXT4-fs: 34 callbacks suppressed [ 1695.457038] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.459734] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.468594] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.471471] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.474939] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.477099] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.481873] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.485081] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.487682] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1695.488873] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:41:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffe000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1711.762866] EXT4-fs: 6 callbacks suppressed [ 1711.762880] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.771286] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.781606] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.787843] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.796884] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.798650] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.800598] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.804434] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.807872] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1711.809629] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:41:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x9000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xdf1e0000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1727.884966] EXT4-fs: 34 callbacks suppressed [ 1727.884989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.897850] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.903106] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.910615] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.912502] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.914068] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.915795] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.919519] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.921462] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1727.927276] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:41:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x10000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffe000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x18000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:41:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1742.612011] EXT4-fs: 24 callbacks suppressed [ 1742.612023] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.618193] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.621830] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.623444] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.626936] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.628685] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.630277] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.633937] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.638483] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1742.640594] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:42:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x40000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1758.793986] EXT4-fs: 18 callbacks suppressed [ 1758.794004] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.797207] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.802919] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.804887] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.807929] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.814463] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.817574] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.819232] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.823373] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1758.824907] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:42:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xffffff8c, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1774.039146] EXT4-fs: 36 callbacks suppressed [ 1774.039160] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.046100] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.054907] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.057277] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.059008] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.061051] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.062950] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.065427] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.069116] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1774.071171] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:42:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xfffffff6, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1787.984396] EXT4-fs: 20 callbacks suppressed [ 1787.984409] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1787.989989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1787.991139] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1787.995091] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1787.997024] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1787.998989] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1788.003298] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1788.005132] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1788.012120] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1788.013025] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:42:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8c17000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb517000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1801.212964] EXT4-fs: 16 callbacks suppressed [ 1801.212976] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.222114] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.237045] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.241788] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.245299] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.249342] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.254952] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.260196] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.266273] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1801.268605] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:42:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:42:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x100000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x200000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1816.040958] EXT4-fs: 10 callbacks suppressed [ 1816.040972] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.044409] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.047441] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.051399] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.053925] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.055337] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.057002] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.060677] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.064212] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1816.065248] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:43:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x300000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x400000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1829.869800] EXT4-fs: 24 callbacks suppressed [ 1829.869814] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.876987] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.879446] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.881341] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.886376] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.888044] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.890183] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.891645] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.896134] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1829.898111] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:43:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x500000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x600000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 1845.228426] EXT4-fs: 30 callbacks suppressed [ 1845.228437] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.234025] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.237315] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.240715] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.249402] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.251033] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.252995] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.254049] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.259183] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1845.260130] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:43:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e1a000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x700000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 1861.022104] EXT4-fs: 12 callbacks suppressed [ 1861.022115] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.024417] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.025821] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.027103] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.029444] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.032480] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.033550] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.034920] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.036246] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1861.043935] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:43:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:43:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x900000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) [ 1878.760573] EXT4-fs: 32 callbacks suppressed [ 1878.760586] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.780533] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.782730] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.784251] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.785728] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.790142] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.794341] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.796413] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.798270] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1878.802366] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:44:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xa00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xb00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) [ 1894.873827] EXT4-fs: 20 callbacks suppressed [ 1894.873842] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.876861] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.881028] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.882803] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.884916] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.886785] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.896365] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.897249] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.901572] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1894.904043] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:44:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x1800000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1908.958139] EXT4-fs: 24 callbacks suppressed [ 1908.958149] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.968233] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.970184] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.979648] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.981937] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.984001] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.984852] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.986177] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.991529] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1908.993490] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:44:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:44:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x100000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x4000000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 1923.114321] EXT4-fs: 12 callbacks suppressed [ 1923.114335] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.119424] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.138350] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.145351] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.150817] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.152268] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.153724] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.157377] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.159440] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1923.161030] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:45:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x200000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xdf1e000000000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x400000000000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 1937.284637] EXT4-fs: 32 callbacks suppressed [ 1937.285495] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.288330] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.291971] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.298841] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.300482] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.302847] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.304586] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.306170] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.307047] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1937.308434] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:45:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) [ 1956.102060] EXT4-fs: 8 callbacks suppressed [ 1956.102075] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.110144] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.111932] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.116411] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.119086] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.121811] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.125096] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.128110] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.129496] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1956.131190] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:45:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x800000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x17b5, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) [ 1971.741146] EXT4-fs: 34 callbacks suppressed [ 1971.741160] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.752112] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.756085] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.758179] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.766620] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.771099] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.772958] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.779400] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.781169] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1971.783388] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:45:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:45:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) [ 1986.668808] EXT4-fs: 22 callbacks suppressed [ 1986.668821] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.680412] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.695756] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.698615] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.703169] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.707569] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.709325] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.714503] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.716382] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 1986.718263] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:46:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x178c, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb517, 0x0, 0x2044034, &(0x7f0000000180)) [ 2000.942551] EXT4-fs: 22 callbacks suppressed [ 2000.942567] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.944512] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.949128] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.951617] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.952788] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.955879] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.959850] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.960943] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.962438] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2000.963727] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:46:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2015.133468] EXT4-fs: 26 callbacks suppressed [ 2015.133483] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.141027] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.150003] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.151405] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.152378] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.155856] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.159901] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.162213] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.163099] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2015.167087] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:46:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x2}) 03:46:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8c17, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2030.253428] EXT4-fs: 8 callbacks suppressed [ 2030.253439] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2030.266037] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.267809] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.269892] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.270907] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2030.279405] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.281031] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.282982] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.284785] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2030.286927] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:46:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x3}) 03:46:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1a2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:46:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x4}) 03:47:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x7}) 03:47:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff, 0x0, 0x2044034, &(0x7f0000000180)) [ 2046.337166] EXT4-fs: 24 callbacks suppressed [ 2046.337180] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.342824] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.354304] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.355759] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.357354] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.359062] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.361368] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.363140] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2046.366926] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2046.373407] EXT4-fs (sda): Unrecognized mount option "" or missing value 03:47:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x8}) 03:47:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e1a, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x9}) 03:47:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x500, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0xa}) 03:47:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x600, 0x0, 0x2044034, &(0x7f0000000180)) [ 2060.386429] EXT4-fs: 30 callbacks suppressed [ 2060.386440] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.388768] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.390751] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.392521] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.399229] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.400991] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.403078] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.404257] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.410931] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2060.413334] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:47:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0xb}) 03:47:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x10}) 03:47:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x900, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x18}) 03:47:32 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2075.543694] EXT4-fs: 28 callbacks suppressed [ 2075.543713] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.550598] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.558045] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.559717] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2075.565115] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.566687] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.568555] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.569609] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.572208] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2075.575955] EXT4-fs (sda): Unrecognized mount option "" or missing value 03:47:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)={[], [], 0x2e}) 03:47:49 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x3f6e}}, './file0/../file0\x00'}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 03:47:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa00, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2091.974546] EXT4-fs: 16 callbacks suppressed [ 2091.974560] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.981775] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.985363] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.987612] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.991968] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.993095] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2091.995736] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2092.008662] EXT4-fs (sda): Unrecognized mount option "h¹q NOJñ.ö i?ògëc䵺†CºHËêÚ“Ý|»¦ñ‰ÐÚ—˜YZš ©¯\ÜÒ(rÙ¸Öô±¡î}@1bc®›«îíýf'4Ãd†fç›àXy´lý°\Žþéh^”抈ëXƒ“£ÆfõÊ&+Qåf-ùpIZÆ»- §¦äº>TÚl倷l?Ï[St–M™„ó@ÑvpmP&àvEcß“A‚jL€ýÎÄq¤iâ [ 2092.008662] %þˆOj”~@q„;8MÒÕõÈú" or missing value 03:47:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb00, 0x0, 0x2044034, &(0x7f0000000180)) [ 2092.036953] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2092.038241] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:47:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:47:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/../file0/file1\x00', 0x0, 0x0, 0x0, 0x202000, 0x0) lstat(&(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64d950"], &(0x7f00000005c0)='./file0/../file0/file1\x00', &(0x7f0000000600)='pvfs2\x00', 0x10, &(0x7f0000000640)='\xf6,\x00') syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000100)='./file0/../file0\x00', 0x4, 0x4, &(0x7f0000000300)=[{&(0x7f0000000180)="5c1bf4a08c201f63e4a1ba100bed9e8058cbfcd123142559a06c378d2b2e5876a84baa5753909dadc9b0ef27e05ba3e7ab0c8a23d8c5ba462c3fa7c7f80db98f487b6dac413093583bb3c97ac311cdc296bb", 0x52, 0x1ff}, {&(0x7f0000000200), 0x0, 0x80}, {&(0x7f0000000240)="c862a44f812cd98e38c667", 0xb, 0x401}, {&(0x7f00000002c0)="eed4caf6947341e185ce0ebba7b88894", 0x10, 0x10001}], 0x2010c00, &(0x7f0000000440)=ANY=[@ANYBLOB='huge=always,nr_inodes=32-xtkp3,mode=00000000000000000000007,huge=within_size,huge=advise,appraise_type=imasig,obj_role=ext4\x00,uid<', @ANYRESDEC=r0, @ANYBLOB='(\x00']) setxattr$incfs_size(&(0x7f0000000200)='./file0/../file0/file1\x00', &(0x7f0000000500), &(0x7f0000000540)=0x7ff, 0x8, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002d80)=0x0) syz_mount_image$vfat(&(0x7f0000000680), &(0x7f00000006c0)='./file0/../file0/file1\x00', 0xe62, 0x9, &(0x7f0000002c80)=[{&(0x7f0000000700)="a3b22f891c6759d0e2ba539239935902b18d9016f6d4782234b5c91b2be7b7a06c65d6b516db6af2a3c91c663a39dd005a8bf30a665ca9e61bd64c5dbbb02fc131afabffd8c9d748ea993e75544a286571f9e2cd436d77fcfd02658857954a65172d62e8702198a475e7391e93630ae2e2b93c9a451fa3359aac4bafff982d00143a232998aa319867c80bd9fc94feea110efbeff15ca7bb92ccdcd766a622ddb0ce93c5bc44b2b376a43dd5d02086956e9ccba37990d4db5203b2541d7f6ee85b034802777fd82a6169a4a37647ed2b247f24cf6396b3028d10f5a1fade76ae1dd2da70a6404a94639f472525d6c6", 0xef, 0x10001}, {&(0x7f0000000800)="d07188f3b7f08cb2ecb6a080a2a0a7127d17075680826bde1ce359f7822a20e9185e27ffd36926b13e65570ad907a13bb9f0ddadcbac9cbf4822a91b1436d31232ec01282f9cde2d82866582432cc4dbe751baa69233cf40b00679a1944b0bb9cdb8a7f91c0cd3bd959fef801c29419fed6e5546932c1dfc137f4cb983dc521dcdc560d82a53c41bab63f5dc00171993352816e702955aa03b970592bb3c1f35cfa161dd72e13391be8f55fd9e91f13dca973a43f3b219d479c439795802904ca06fde6ec85aca5ff95d3d91fe55", 0xce, 0x800}, {&(0x7f0000000900)="5d1ea964be48a7bd63b91617e628285fa76484a261fa80911ea65b7b4ff2b29cde7694abb29a00ffbe24b1333d37532486a06bc3b55769c505d1ec59f7ddff7b6ef72d38db806de950047e9f2788143e873e026f0df4325a14ea19cce5561ea357d19d00aab6ee1276860df19f4f9b8aedbb2e6a861e6b5ef9f0cf50621734bfe4dedb48a9856dfecf591af878572a2373f2e0909608ed1ced73204be08c760f844a26b5e555954c7654b78a802d4bcd8a62e9356394edcff6e6e92c9b1208541fa69f6e5b38a9fd356a8186d19831578b4fe697de5c938409ce0d16b5279b47a58aa05d996b158eef3f2f2092d93d173101dcacaa9b", 0xf6, 0x401}, {&(0x7f0000000a00)="3dac1936f883b1a28b1c7d15b48233164e0b9741d3fd69793f252bc5f0147a271270b5607493bda13c23ea8332e2f6158f4cad095967f64cb376636287045ebde892226b0f3c462b441809834076764be7d671402fb05b58974abaa822166f763f620762d1d3a3a834e725dfbbc7c4cccdc029ab0da7ea00837615ce33177616c507aaeea1dd92793a2e6a79c30853a4e6ac9a7f5bea492d7f7ce6607079fac2083f564bd712c028d7354c9b201f4ab3274eeaa2308fedf6d005673164552cca0b15ac0b05499967ff02e2e8125c37f035d6", 0xd2, 0x6}, {&(0x7f0000000b00)="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", 0x1000, 0x60}, {&(0x7f0000001b00)="780c3f1976ac74fd25f45fc4cc5f61c98d73c80f8dd9ecf4864726abcf8cfe370bdd8c790c223e23a9d766cad1b4494972e101622730105e444ea1260e5744ba8e1ca6f2e8e41bf7d993753eb4dcc22ab49b5bdbca6099a22ad5a8fb41f03d7a34d1f625675f76c6228aff1b459ddc1efc5e05799e9db280e244ebb3115ebd776ea530db29fa67823214c21c52aa76a60c4a8fbff02156eb56a0cd38edc863", 0x9f, 0x9}, {&(0x7f0000001bc0)="a450761371d3b824f221169b4e275f8ccb3e9a8ce28cfda536373415acfcdedeef946e298088b7b349e5c5c1937698ea1bc620317493f3e9ff4c91122df3f1560a1abf077d4af98d0cd89845b00aad1e21", 0x51, 0x401}, {&(0x7f0000001c40)="db5d9bdd988c03f7", 0x8, 0x4}, {&(0x7f0000001c80)="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", 0x1000}], 0x40400, &(0x7f0000002dc0)={[{@utf8}, {@shortname_lower}, {@utf8}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'utf8'}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000580)=ANY=[@ANYBLOB="bb798f80d1670e4ffc6cc95b676c5682e92f2e1aa57bc6d3053b055efac900000000000038e0d8aaa4594858a9af5cfd80b098cf9d4beeda3635eb"]) 03:48:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1800, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r2) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) r5 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0/../file0\x00', 0x2, 0x5, &(0x7f00000023c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x5}, {&(0x7f00000001c0)="aee99105001bf9e79bff604868dcfaa8477789b0751be19d0962a05562ca5910c991cf40007105cc137350524f7a0f87707bc3e1b4316b69ef7105fb204892854470500149662650971262fb37ebd6248cf73de0a7b95ff5e8db87ad9f831907395a61538b8c43455ad4d8", 0x6b, 0x41}, {&(0x7f00000012c0)="593191929c57e6c06df8a63b106ca0375727ce26e70fe676e9d6e832b53aa06aae56d161529893f4fe295a104b18138f7330a0dacf376a32d4be35bc6cdd0c723ae9b9569a58df070a71416ada42f9117d762265579cbfb86fdbaeafeaa810be5771c90d1e988302c66efec48f7ea740a626c447bae385797c8b27520d04f22b6b86b480daa0e09b944b5b33ad7e28cd2757d1173d3b66f03b5660affdc3adb4b2fc2512a725d26679e66edfd55da84f8fe6e05ff4104a733c74074c80cb2a995a6141d07a75787a248d9bd901833d8c44d3234318ad9384e80e695704585b", 0xdf, 0x8}, {&(0x7f00000013c0)="a8e31479a789524f070ee1bc9cbf8cda9b03a1b822e3711a5a82f62c9bd749b0c51874ee7510e32900bbe35d465739d95e61cc057ee769cc43aaf4db326a346b0518ceacb810d8420a6890b5bd6db87f0e906638d43edf36b8cb59ae6e848c0f4e7290f9dfc199a1fd5a2950d785f5613227eed6d43aba8fae0595cbb5187a8496432c97ef7d7cff732dc9da74b841b78ac3a2ab6bfeb0306fbf3e85d3849e7a908a1743e190ab44b1d0dcadffc02f7010f006083e852bd45f5d3e9035c1bce94a5789def73f4919fd8517e8bfba69365698a2cd3f8120e7fe683d6cb09b1541b8b86173e7190ae35dd248d103fcbff68bc7f38260847c174fbc8a2fc6a6d67cae9fdb017a1740965e5c5f2b07f32106f610bf0e22ee00dc007d2ac35aa5212c2ffdcefac8eb75405b5bf3fbf8af4a990315928375e68ca60ab5ed4ec636c83ed47ea95f8ac257b9ce8d111b2cc97d97663c03a5d044081622b221efaaa548402dae1380400d98408a44579cf4c9586502f53fe45ea775ad81568bbae373dcdb229f209511e5a75bc6062c64f29d2861fb801914c9a4b71d6921839a3bc651d4ac88edfcbbb617c3bfe2f0de5fa3bc09ac65494dff4e6db8b6ecb995039a180f771b62487319c725e5dcd360f58d5d7ba2b932378de1e859d854f7e1f6dd53ed391d06a191cf00c827a58f01b46b7f9bba344388c5f51dfd0ec859fd51de9ca09120124eb50d03a4e577145c4703e23d6ce9f53bb177daed4a1058853eaf18f36d70f72eedf74ba92c90640b234fb66b9f6c71d54649b7a0d9b5bc35cb7324c21428a22d5d776ac9334f881092dfe35bc2bd8d12b68f1bb3fd00ad683dd377257a7ab5ab2e23941024046ebeae3780e343ce673664b128f3c38070f3743d7a1d7e77e4b5f542d1756864b3d2121c4d3b3deea59e7d7bb2ea05bbe25ece27082d79ca2cd224a2e6c286fad74007f4465f6413c0c13a9bedd08f18915e63ecb20a7b3d5e290e99f06a12e03d901bf9fb4a3666f136832da8762b7ba889787012f4bfce5021b40ae05b87a12e6b993795ddb0dbc871a042ff6f87652a628553e50f25d27725187139cecdea7658be814ead90972851d3e1e1620123074a1d03ed2c94f5c8ec7afb91d87362f9183fa7e66e8b0f3d37af0edf4a1169fd14a638906e2301e059ee512c14732286c0318a69b08a07aa03b2d98eba86be7f4fb7685b92fa9ebf0729f625790f5c2cb45b5ed96d363a89d7992fff948d4fc7c963cf63b0e111c82f22daf2834eb77b68a2bfd77d3311fa599c81e8dc2b56b37a09da5a21b9e64d3060d535807817d60e284cbe6f697d6ffc172db80974a7e982e55034730e789301cfd3db7714e7b58528bb52b500ba21bdd0844671c09e9b2004f8d51eea57fc031c2a886e7c57df9a26a1d10d74d8e31ac66c284a7d0a3c6a32ea0c41659dd88328b706bf5277448a05415c92746f1f77748629f0bb878079f2d690c6c8f2e09b6a9b07c73fd484fcd87b7f8fe6c72d56ce6255692c6b43eff692951f8c92b1cf06afd606efa06ab27f25d34aa2668aa64e0c4e3bddcc20d89ece2bfbd09c565f11b67d74319b1ac65299a6c77bf0d9717e04e4708a68e16a64745246dd2d6877cfe5d82b25f15aeb181a3a031d53e70f79d97acc380bed47dcc782eba6d53f58d0064b1c2cb366455aed351ddf47f903bf7b883281258013e1a07138e91f289e20ab3ddc0ee36697b96634784275aef8b2f7c69ff884da2ac2a2d9d12ce47016ffa2f9aed67471ad3c5133120c90f5797fce158e295eb6aec12fce4ad7a1ab08bcad2fae44554a445f784a7054265f131e158795d7e3d6a776b84cd8cfd3982d1064f03bd0f8189b73ee21c72dba2963c913113243e85efd6dea6f3e5e36e8e161afbedc0b5bd7dd268b6f45fa54035111051e5d6c1903f0056535f91d1a8ba21788db1b255424de59ed7cbb93f8ee2941f2197e9838e537ca3fc63abd44dd546c10dc58d2838021124ae3de561b651885af30ea9522060123a8885e04fdacd660a6eeedeebfcb1ed245770cf250d8f2315fc1d1daab021eaeb57f30bb9e4e23fae5f5978faddadb72bb0da87373f7c1cd1f40cb2cd6acc9671d16168a0ba4d1d2a47a155674ed7de999200ce2263d0c97e87e240489ee7b879773ecf859c0564eb44f8da6ff6ddffa809e38c7479ec23575b6a4562ed7309493ec58e9e8272ee6fa8d9c7c8d68fe63c96d4c93f09169b156d6b1da6b181c94480c0c1e29be458d52818e8a2283849e3ef8e4174151af4e89f93be647c609c732cdd4e3d3d82c0817c471d5b1a3093262f7aa693c910028407996a2a6ce17b5eab345ae739459c548ba58531c35bdb249cfac01ea9aabb7c27a09c3167376b3a7696f7008ea6bc75bb6208b00d58626f7f32bc48ea3fbe2afe1ccb90f986aedfd4147a948b0e9a8afd3f26df57255b8547dfb20950fcd27de5580ff71173e50c502ebd5dceac7a7a64b65bc86c1c5e3a2203369711b1eab4c71b32043bbca456b84c6e1217f0e13e205aad86bce4968bdb45233f25d7fd2d6e7d0b226134e7f6bb98858efe5be6d7252c587bcc69196c90b2ecd98e1da26ad99852057b72ba13c9a99300307900bab05ad254b18556dc75a189c14a23e13a3e1abed40d045b46d89d085c2490e5c7d383e90318b258212a322fa43e6f74190ac9c54ac591ac17e3bc67d016aa264197c498fba424105d7b1e0ffd8d65d6cd67afd41b219a2a822882de2eaccfc5a759e85659af39a0223ed64c37459fc71e6b9223a8ef0daeb5bf010455031ba84bdca0720deeef25769b9d4409772f1dcc12e6b2a522c3c957e8e3b3ffdea7cdd0436280380922a8833a359073bf46f76d890e188c387e46d6c00243016487bc49a3a6073ec628d10bc777717ba13b16ed4b4df56db8a7dffe8ed70f182155764c86e767d8c01850a8d132cfb50b1b3dead3d7e9b34862daeaddf953a7269b37ea1c3f0f90ed4a0c4c2487dc06e109f7989d00a3614c6a0ece1b453725c6bf1f2633187ab5a1fcac552a6501723847e8313218f6d686220b86f6b8d0a2272cdf1ce2c292abdaabce42fcaceb70e6b1cf93bca56b5a8d7d68a12e3d009be1d64b0ed640420c436b8e0a0069f6e34991a8654b185cd2ba3bbcccff7d0379ba0611335578fd4de97223de306594cd7505afbfd546dadeef5a3dc0aae6747d4f0373a971a82885f10df86642a9025daa9a13e570ef93f77f645d1f1a31461f1a6bccb2cf81be15d49aedb6197c5b3d4122a2ba666f36f0b564f8b510420c0c7a4bc6041c622d4c83042d17de30e0600503d36ba486ee795cb524a0c78e909e61759592a13fa055cf96acfcee0490755911400f054e334b4d9190b49882a9f3f7d23827e34a976055d2f5da133e845cfdc3dc8da33e3adbea99f367edafe40fde1f2f1d6d8a94b33f9f9eac49e3925ebfc987b8b534d80e1e84cf97fc8fbd2be9f76c7ffe8efa2cefd449de42b80e4acfc310891995245f109ea2569708b61b842f698be9341b7595025ce70f1f2131d92e2f2c0d2ac3b2df959a178aa835bb779b5737747e328f030fb7a8debae3f1e325d0eb4955b34a101b8010e910d7af2d70316dddd73943211f868be556688baed17a2854f33aad138350acc71dc16e48e96e8f5ad87d15dfdadb8442544b832b9817d8eadf1740105c5c060b8230cf07d2d416de24cee7ac05386ee657f24fe558e31ea0b9cbd8c4067d6cff311604fd156ae3a50c7cf9642e9d683c1a0e5b2f0ebf7365e8a8500825c174b12246a5b2741053751b170af43b32c4aabd64ef2b0c0a02f5473ded261a7a6ca5ad8ac8f9f7b393e7c4d5c5582ad0e42fc8969e25d180098091e04696eea2652389ddd4f9eef94391844ac65bbcf3dcbba88aee637c609b94d00aa197a099539fefc1486eb84b01ee9fc69e5eadd886b466192c6d373f13dcefc8bffc6ba0d5e5df46c5d83e24b73b9b51f6b5ae25907ae0041140c5d57c763ab9e37eedec8608f8d02291c014dfa14231142f475181025beb4673f89933d635b76c701dab867ac6d19a96af3189711365185e08c2aeaf0defeb591bc854f6721c3e5bf91452902c771cbba21ba2906ecf9073b1cc96e95a6e5727afcfc152ebfd326e6ce3adaa381678a6f512dbe583353b54353d9fb591825ba985dfb4ea538473c018ec0a434b4bc664b0aeab32a59cfd73d30768713622d3da4a06b8e21b002356e8ef6976d9bc9e605df96344280246298cc8c593a7e6db98d66c9c81dc5025604f24d18cafa8590d8289ce1639933a31264ce337223e8101e6610046b6ade5132e35c5167181f313c9b72d92d70ca8944649f39de42a1698f8b73e4c5fea629557f4bca920fb8840aa51bea091a05ee5dbd4eba53a3aa950b0ec220a64f510a9c96eec29480752e1cb201da218c4ca7c37b68a315ec8c4b0679a8aef345d8533ee19bbcf86bd0d5b9a89a63c2fb54d4dd28509b908b815fe25da60a5db0be323c45e83a4bab8b740863f2aa9d001dd1d39e12601f5cb4210bede0dbb0cd34597b03b4921f6508a3e8d9cade9a93b2078f877d262459b312f47cf4f54fe8e6103f1400699874b2fe9353dabb56f146441e4512b837524eb9d2fd16f5bec781a6beb0179e7ea4d994fb939d1a798e754609303df9ee19ed36507958f155416b944bb92e290b1eb3888c58a58c52c7bf61fe402559dad0fa7d4a3c337cf832d939746ab6d7d7bb92405823c58c28726362f8934b065241f6f04b145e69ebb33480f8f2f64cb668299619bb2dac1c0f353be824023524264748a10ef0cfd7ac8b1361d0d9c69882490f2d51ec616413b0323597e949bc397fdd321170fe0f613243b2a689e02892b49e603057ba2d6ef3b3a854560ef9ff12cafe9ca1550614c81eac8b06bece38051f142484f111015315e5a5eea4701d1b9a5f6e2931005d787298d4b17fed96246e33afa6fae149ef212c088295107ee62dfb8f69097a29172d12591fb63a9fdcbd0bffbc6f28127dc4fa98ac71b6a45f72f2f7e14353c0ca76d5cad571adab7f38403a2c824a2419a9c5c240428b395c5828f7e6c73d54fd2ef0f5d792f4a3b7005de17176fc1d94720500c4f05644751fa622ece2512bc8675546ab1600d8d2cf18e8f5c2021e5747e4c62669709f7948fd29c09816fb60671f4576694e445883e413e81e3fa236d077000ab80839ebd99ba136b2600b3c06b281617b5975be8a824efc7918155090000160dc83d327bfad2250fd097f798f499617ea8e6f2d2f7dff77c2e152bb8b99142e1bab5b830b98bcd27836e95591f78061e71041f3d442f9d2ec2c5532569be96f410a6ff507cbd9b903ab9f7b2b671543cd419cf2ef90ed3a060998fbebcc25ba3e12eec0e8aaebda6c3d5c6bf9c8ae2acbd7bf47484bbcd57bd606c859fe52f0f9cb61bd74b5342f7c6a303458bdc52cd8b63e38efab03b23db884991b7302ad0ee5425d89fd73d6303d7ec353221d9e439530d970b3443d6570c772d198923f9a2fee0e234871d94b036eb3a20013f03188242705a0a2b61260d55d5ea7459e503a48c1a3c0188fe15019dbaa3b2ed8e1749a7944fd602d5f24c46e3599fd87b4bd4f65099ee1b7e72d4d954883f74e1744ad69417bdace6d0d3eba61b34bcb3b11d5b8ce3d6dce4e6f6d651c5c73dac69df46bb15d851e378be71c8a29e0ca1e208f1e26e5b3f7e14d5f98e5fd24c998d3be0d55382394e7729e532480bd233dcd5367f08c3243401ad2b6a776d2e4897717", 0x1000, 0xaef}, {&(0x7f0000002f40)="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", 0x1000, 0x6}], 0x8010, &(0x7f0000002440)={[{}, {@nojoliet}, {@block={'block', 0x3d, 0xe00}}, {@uid={'uid', 0x3d, 0xee01}}, {@hide}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@measure}, {@fsname={'fsname', 0x3d, '#'}}, {@measure}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, '*+![+}%(:'}}, {@euid_gt={'euid>', 0xee00}}, {@fowner_gt={'fowner>', 0xee00}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r5, {r0}}, './file1\x00'}) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 2107.963887] EXT4-fs: 19 callbacks suppressed [ 2107.963905] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2107.974394] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2107.976581] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2107.979046] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2107.987116] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2107.991640] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:48:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2108.011423] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2108.014411] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2108.017591] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2108.023517] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:48:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1edf, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100), 0x4000, &(0x7f00000001c0)={'trans=unix,', {[], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x34, 0x33, 0x33, 0x65, 0x10, 0x35], 0x2d, [0x30, 0x36, 0x62, 0x30], 0x2d, [0x39, 0x63, 0x64, 0x61], 0x2d, [0x36, 0x37, 0x65, 0x62], 0x2d, [0x64, 0x34, 0x37, 0x33, 0x66, 0x0, 0x36, 0x30]}}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}}) 03:48:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e00, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2122.847640] EXT4-fs: 20 callbacks suppressed [ 2122.848573] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.861845] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.870755] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.873315] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.876530] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.879366] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.881311] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.883142] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.888481] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2122.895165] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:48:20 executing program 7: ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000040)={0x2, 0x5, 0x6, 0x401, 0xfc, "5bd83629abca73974a677d90d37c067e6d6937", 0x8, 0x9}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) mknod(&(0x7f0000000040)='./file0\x00', 0x100, 0x400) 03:48:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xa000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xdf1e, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x9, &(0x7f0000001600)=[{&(0x7f00000002c0)="60a67279387d419e8374c6496043520c8b22492fa01897075bf67f6238f1ec32ccf9faa2fa90e8261041bc368e92cbcbcff6f40878d046029a7ed9265c2260c4da8dca10e4bb0540639425af02863aef54d419b40e13cc50e30e3ca052ce5e747dbfc4d7182abf8bb6f602cfd94796ab7b944accb7636f19959f309710b5cf2975242e111cd14c7d04ae608396fe95a2e94dec946f19d3e15ddf9a332934bddb25b097f32ac39554535a0dff12dcfd76345bbfa7cf00acc06a6554fbbe1df0c4c9bf15d325ec48554a21a67cdfbf0db44a7280ba7d84d041faf860a3e0269cd871e65f7d5fdab750d860e2b6a0a0", 0xee, 0x8}, {&(0x7f0000000100)="3421064dbfcbd62afe4844197699d659da", 0x11}, {&(0x7f00000003c0)="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", 0x1000, 0x7}, {&(0x7f00000001c0)="c16022964ca56f9010745bbee14cc93556514161cbdd4dc942042955f977fa414a90f15e283e86725f", 0x29, 0x8001}, {&(0x7f00000013c0)="7cb57a5e49e48c42e603102d0fcfe7ef70240a477f011a52546925f8d10a5c572ab1016b699466b68b39da6fdbcbc80d3d7d0ac89babaf6a61a991fa90e6a2cbd4f44b546796b93e4fa09a6616fd0152bd54b4fa464dee36c6466e4719e8a5f627ea6b108eca6a8e5252f812c49c6c7772b9a99d6f69499f9f23f800ae001488a7cc40324bd3eb2703223ce69b9e7a42ead37d50fe1e1ec7469e2bef9ef20adc4ade0d490b7cc11847df4399ea6961367c98df99ce8db4e0ec60f4bfe10bb5bdb7d9e6a65450", 0xc6, 0x401}, {&(0x7f0000000200)="8f4bd696dc08f71eb6371339d2e378347e6916b07f5e1271b1c8b159d073163108b42bc7223e2dcd8223e1bd00e6d76694dc1addc8af16400ddbc4f549975da357ab83fecef1d24a131688afb2ec5ff8b6e7e3cc0d45414d89f9200609cfaaf8", 0x60, 0x4}, {&(0x7f00000014c0)="805f7906bd07366e3cf6ba498fd2b537cfb38b98809eb4ad6e9f672b21f53fd74d069ef536a7ecc2aacee7b1ee08315eebec77157f007bb57d7106f67bdba551c81da4b8d086c907", 0x48, 0xffffffffffffff81}, {&(0x7f0000001540)="a04cc851830896e17f32e64e56008e987891a21788da4e78c6c5119de779918390c694f369791801fea5cd8320b9f4c86ee467bee513a1d5f42bcf2e0389d01a54aae770f7d78eb3b8d8d38b49297b4c0894412ee7aec77c6bd159ca3c1e5fa733cad016e07f4b93d1692089eb3af0f56d6030a2", 0x74, 0x20004}, {&(0x7f00000015c0)="78f00e6a", 0x4, 0x2d1}], 0x40, &(0x7f0000005180)=ANY=[@ANYBLOB="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"]) r1 = syz_mount_image$iso9660(&(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', 0x2, 0x5, &(0x7f00000029c0)=[{&(0x7f0000001800)="25fb3a84da5b8ab8ed4da9b4737db74881ff2d54e288164415e91c1bf8102a7b1774eb54e28a6bd9cc19330aae234577d4b21af3f2f86e0a4cb040569c0d", 0x3e}, {&(0x7f0000001840)="62e4700c0853567f", 0x8, 0x7f}, {&(0x7f0000001880)="650e", 0x2, 0xc6d2}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="9d1b48bc3d71ee12b139e4b85e40566608803ca35eb3e973d3e1708d35dbfbdc96ccd1b43327c6d53da6d41da85a5bbe6614a6316181a38ac212b196a83e883e6d23a95ecd9c64427a6cd31174e0133bfa27f0831bc061ce022acbbad2e76971303ccdc8b13c46e9e093adc72a88200297df845747e90570866482a8bbba1c2d998958b4bb6fc6d144616551edd06798cc72daa90422623e7a47a5a6d9ff588a9897a63acb5df734998a89972092216f8265b24043329924212ce2d7422f67a434139799f32846675990098eba1a2e101bf9cabe8ab6d80ed05e061672a0a0d3", 0xe0, 0x1}], 0x100002, &(0x7f0000002a40)={[{@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode', 0x3d, 0x7}}, {@sbsector={'sbsector', 0x3d, 0x3641}}, {@iocharset={'iocharset', 0x3d, 'cp857'}}, {@block={'block', 0x3d, 0x99546666231de238}}, {@session={'session', 0x3d, 0x50}}, {@map_acorn}], [{@smackfsfloor}, {@smackfsroot={'smackfsroot', 0x3d, '-@!'}}, {@pcr={'pcr', 0x3d, 0x22}}]}) linkat(r0, &(0x7f0000001740)='./file0\x00', r1, &(0x7f0000002b40)='./file0/../file0\x00', 0x400) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000280)="0b199c1237a875ce03b255ec78bdbc4be27baca3f0d9734c8335041d161eaa95104e45e40dffd0647b900efe54dd9618a77a0e5cf285f41a3b4e2d8911aee08500301419", 0x44, 0xfffffffffffffffc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$revoke(0x3, r2) keyctl$chown(0x4, r2, 0xee01, r3) stat(&(0x7f0000002ec0)='./file0/../file0\x00', &(0x7f0000005000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = request_key(&(0x7f0000005600)='encrypted\x00', &(0x7f0000005640)={'syz', 0x2}, &(0x7f0000005680)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000005580), &(0x7f00000055c0)={'syz', 0x1}, 0x0, 0x0, r5) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "dd722e32162db827ed6f3fc6d73425297a20a08a5c4477d6d731308a201d0763b5b267b8db2e5d811fb29b034305d3d47654dbd72b641f61dd467ec58b3cfd33"}, 0x48, 0xffffffffffffffff) keyctl$update(0x2, r6, 0x0, 0x0) add_key(&(0x7f0000005500)='id_resolver\x00', &(0x7f0000005540)={'syz', 0x2}, 0x0, 0x0, r6) readv(r1, &(0x7f0000001700)=[{&(0x7f00000052c0)=""/75, 0x4b}, {&(0x7f0000005340)=""/224, 0xe0}, {&(0x7f0000005440)=""/160, 0xa0}], 0x3) syz_mount_image$tmpfs(&(0x7f0000002b80), &(0x7f0000002bc0)='./file0/../file0\x00', 0x9, 0x6, &(0x7f0000004f40)=[{&(0x7f0000002c00)="d551ccd36b54f960ee5ff291b5977952332699f8320c820fbbdefb47352a9f5670b0450137de9cd76281c8dc16a273", 0x2f, 0x200}, {&(0x7f0000002f40)="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", 0x1000, 0x7027}, {&(0x7f0000002c40)="3d3643b08b8f8d08bdbad17f9098e9f2778a013721dd57eb322eac41e201ce233b70aed74283afb7103015838c1a5c0520bb244ad443a7396291136769a94fec20e1cf2d5dcb7b7a0e01b52ab0c987f4159400f0dc0ef4ec3f17222fb874f7d55ad5f5ea2a2b536e587522360f", 0x6d, 0x3ff}, {&(0x7f0000002cc0)="b832beb374d7199a29a75a783df3c4e87811a0561a6a471e4b217c1ea1031dcbcb4cde47b13e34c90e9a77e735e44b91a8fe9e94e2e3df256582e560236083da119ab166bad7c7d0b9bf303a9f990cf5768a1eb9ca5a154405750de0f9dfb0e05cb1154521d836b3e5e68925341e06c1d841244cb619e96e9537e1f03fd90ea5410ddedfeb1d39ba90a8a65bcbebbb39999d7288caf705b94624587e6ef55bf70aecdcf1c51a14694f8f0cb209c669014e06dafe19c48a2702c2652e3ef8e26a12ba785c80819fbb", 0xc8, 0x32}, {&(0x7f0000003f40)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000002dc0)="2f1d4e094850171ca714a76095d435a5ab60df014f989e43b4cdda2854911407625daf10da090782a6d6f24721cb56f0b68517292552921629f46a650fe446651879cc40801f6e41ac11496de4a0ba556807b9ae7626a103abfb75f824d635a745775b138625d47c0e08862bee5e9f92a911615c9fca92a42098f5341232000be1a7dce62d111aaf9029108714468ad63ca6e1b426ee5383ef0b66d5fc9e1304c6d85e2aa6733eaf44f2948e34127f6d10e47bf357094fb1d2b951b5935bc168225dc9e458aff001dc49681c", 0xcc, 0x6}], 0x1000800, &(0x7f0000005080)={[{@huge_advise}, {@gid={'gid', 0x3d, r3}}, {@size={'size', 0x3d, [0x34, 0x38, 0x70, 0x65, 0x78, 0x31, 0x30, 0x34, 0x2d]}}, {@gid={'gid', 0x3d, r4}}, {@gid}, {@huge_never}, {@mode={'mode', 0x3d, 0x7}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfstransmute}, {@obj_user={'obj_user', 0x3d, 'iso9660\x00'}}, {@audit}]}) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 2138.539031] EXT4-fs: 21 callbacks suppressed [ 2138.539057] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.543222] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.544613] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.547543] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.549507] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.550897] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.553916] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.557118] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.564490] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.565559] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2138.570702] nfs4: Unknown parameter 'fsname' [ 2138.609363] tmpfs: Unsupported parameter 'huge' [ 2138.621628] nfs4: Unknown parameter 'fsname' [ 2138.640177] tmpfs: Unsupported parameter 'huge' 03:48:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x100000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x80000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xb5170000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000002c0)=""/201, 0xc9) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100), 0x1000000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x10000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xe0ffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffe000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x200000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) mount(&(0x7f00000001c0)=@sg0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='nfs\x00', 0x40002, &(0x7f0000000340)='ext4\x00') r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r4 = fcntl$dupfd(r3, 0x0, r2) writev(r4, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) chmod(&(0x7f0000000100)='./file0/../file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000240)=0x8) renameat2(r0, &(0x7f0000000040)='./file0/../file0\x00', r4, &(0x7f00000000c0)='./file0\x00', 0x0) [ 2153.954543] EXT4-fs: 27 callbacks suppressed [ 2153.954554] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.958391] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.961314] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.962878] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.964039] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.970069] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.971855] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.974644] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.978371] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2153.979340] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:48:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:48:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x300000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x6000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 7: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000000)=ANY=[@ANYBLOB="e22e4c8000002800"]) 03:49:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8c170000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x18000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2167.807984] EXT4-fs: 12 callbacks suppressed [ 2167.807997] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.813480] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.816617] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.821540] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.824367] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.825423] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.826482] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.828295] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.830074] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2167.831610] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 03:49:05 executing program 7: openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sysvipc/msg\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@md0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='ceph\x00', 0x148000, &(0x7f00000001c0)='ext4\x00') syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) mount$bind(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x84, 0x0) 03:49:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x400000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x3000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x7000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8cffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x6, 0xffff, 0x80000001}) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r3 = fcntl$dupfd(r2, 0x0, r1) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000240)=0x8) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0xfffd, 0x1, 0x81, 0x37, 0x2}}) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x700000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xf6ffffff, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x2e1a0000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x4000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffff8c, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x440b4, &(0x7f00000000c0)={[{@abort}, {@jqfmt_vfsold}, {@jqfmt_vfsold}, {@delalloc}, {@commit={'commit', 0x3d, 0xffffffff}}, {@orlov}]}) execveat(r0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000002c0)=[&(0x7f00000001c0)='(&%.^-$\x00', &(0x7f0000000200)='($[::\x00', &(0x7f0000000240)='\x84\xaf:]&\x00', &(0x7f0000000280)='delalloc'], &(0x7f0000000500)=[&(0x7f0000000300)='orlov', &(0x7f0000000340)='delalloc', &(0x7f0000000380)='commit', &(0x7f00000003c0)='\x00', &(0x7f0000000400)=',&&+-\x00', &(0x7f0000000440)='}!\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='\\:^\x00'], 0x100) [ 2182.395334] EXT4-fs: 20 callbacks suppressed [ 2182.395350] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.400441] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.404230] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.405964] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.407367] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.408266] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.409816] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.411345] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.414210] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.416876] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2182.427527] EXT4-fs error (device sda): ext4_remount:5890: Abort forced by user [ 2182.430162] Aborting journal on device sda-8. [ 2182.446265] EXT4-fs error (device sda): ext4_remount:5890: Abort forced by user [ 2182.448089] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal 03:49:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xfffffff6, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x8000000000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2044034, &(0x7f0000000180)) [ 2182.464143] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal [ 2182.465962] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal 03:49:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x5000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x9000000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0xffffe000, 0x0, 0x2044034, &(0x7f0000000180)) 03:49:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x800000000000000, 0x0, 0x2044034, &(0x7f0000000180)) [ 2182.894386] device lo left promiscuous mode 2023/12/09 03:49:34 executor 6 failed 11 times: failed to create temp dir: mkdir syzkaller-testdir357156090: read-only file system VM DIAGNOSIS: 03:49:34 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=ffff888021489000 RCX=0000000000000007 RDX=0000000000000000 RSI=0000000000000000 RDI=ffff88804a441e48 RBP=0000000000000000 RSP=ffff8880159df978 R8 =0000000000000001 R9 =ffff88804a441dc0 R10=ffffed10094883cf R11=0000000000000001 R12=ffff8880214892c0 R13=0000000000000500 R14=0000000000000000 R15=ffff88804a441dc0 RIP=ffffffff82021804 RFL=00000216 [----AP-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fdb8b5f0240 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff9918bf328 CR3=000000001730c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=000000000000000000000000ff0000ff XMM02=000000000000000000000000ff0000ff XMM03=746964646120726f66206b6365684320 XMM04=737973722e7777772f2f3a7370747468 XMM05=2e656e6f20736968742065726f666562 XMM06=6c616e6f69746964646120726f66206b XMM07=656220746f6e20646c756f63202c7473 XMM08=7261747320676f6c73797372004b4f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000001 RCX=ffffffff81410d1b RDX=0000000000000001 RSI=ffffffff81410de3 RDI=0000000000000005 RBP=ffffffffa0000000 RSP=ffff88800fe27888 R8 =0000000000000000 R9 =ffffffff868616e7 R10=0000000000000000 R11=0000000000000001 R12=0000000000000000 R13=dffffc0000000000 R14=ffffffff85035548 R15=0000000000000170 RIP=ffffffff81408bf4 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f1d71fd7900 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1d715f5280 CR3=000000000dc8e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=764eacd87155b5a900000000000ae968 XMM05=1290c77a151f421500000000005d9a90 XMM06=375afdebbf381c810000000000122c28 XMM07=00000000000000000000000000000000 XMM08=415453454d49545f454d49544c414552 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200020002000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000