x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 416.234363] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:37:28 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:28 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') 15:37:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 15:37:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 15:37:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) 15:37:28 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:28 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 432.370889] FAULT_INJECTION: forcing a failure. [ 432.370889] name failslab, interval 1, probability 0, space 0, times 0 [ 432.374165] CPU: 0 PID: 4736 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 432.375878] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 432.377958] Call Trace: [ 432.378624] dump_stack+0x107/0x167 [ 432.379534] should_fail.cold+0x5/0xa [ 432.380508] ? __es_insert_extent+0xed1/0x1370 [ 432.381642] should_failslab+0x5/0x20 [ 432.382602] kmem_cache_alloc+0x5b/0x310 [ 432.383632] __es_insert_extent+0xed1/0x1370 [ 432.384767] ? do_raw_read_unlock+0x70/0x70 [ 432.385849] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 432.387190] ext4_es_insert_extent+0x45d/0xf10 [ 432.388352] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 432.389459] ? ext4_es_find_extent_range+0x1cb/0x460 [ 432.390724] ? lock_downgrade+0x6d0/0x6d0 [ 432.391779] ? __ext4_handle_dirty_super+0x100/0x100 [ 432.393055] ? __es_find_extent_range+0x197/0x4b0 [ 432.394278] ? do_raw_read_unlock+0x3b/0x70 [ 432.395356] ext4_ext_map_blocks+0x1863/0x5830 [ 432.396538] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 432.397845] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 432.399176] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 432.400498] ? ext4_ext_release+0x10/0x10 [ 432.401560] ? lock_release+0x680/0x680 [ 432.402554] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 432.403756] ? lock_downgrade+0x6d0/0x6d0 [ 432.404826] ? down_read+0x10f/0x430 [ 432.405701] ? down_write+0x160/0x160 [ 432.406492] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 432.407474] ext4_map_blocks+0x8e1/0x1910 [ 432.408363] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 432.409310] ? __brelse+0x84/0xa0 [ 432.410030] ? __ext4_new_inode+0x148/0x5370 [ 432.410979] ext4_append+0x1b8/0x4e0 [ 432.411771] ? ext4_move_extents+0x3050/0x3050 [ 432.412753] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 432.413771] ext4_init_new_dir+0x25e/0x4d0 [ 432.414666] ? ext4_init_dot_dotdot+0x610/0x610 [ 432.415640] ext4_mkdir+0x3c1/0xb10 [ 432.416438] ? ext4_rmdir+0xf70/0xf70 [ 432.417264] vfs_mkdir+0x493/0x750 [ 432.418017] do_mkdirat+0x150/0x2b0 [ 432.418771] ? user_path_create+0xf0/0xf0 [ 432.419649] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 432.420752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 432.421845] do_syscall_64+0x33/0x40 [ 432.422606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 432.423688] RIP: 0033:0x7f9c2c527c27 [ 432.424461] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.428328] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 432.429914] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 432.431419] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 432.432930] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 432.434447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 432.435962] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:37:28 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:37:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 15:37:28 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 432.520471] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:37:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) [ 432.691887] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:37:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 15:37:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', 0x0, 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) 15:37:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:37:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 15:37:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 447.802827] FAULT_INJECTION: forcing a failure. [ 447.802827] name failslab, interval 1, probability 0, space 0, times 0 [ 447.805240] CPU: 1 PID: 4779 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 447.806661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 447.808397] Call Trace: [ 447.808962] dump_stack+0x107/0x167 [ 447.809728] should_fail.cold+0x5/0xa [ 447.810534] ? create_object.isra.0+0x3a/0xa20 15:37:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 447.811690] should_failslab+0x5/0x20 [ 447.812596] kmem_cache_alloc+0x5b/0x310 [ 447.813466] create_object.isra.0+0x3a/0xa20 [ 447.814386] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 447.815457] kmem_cache_alloc+0x159/0x310 [ 447.816338] __es_insert_extent+0xed1/0x1370 [ 447.817273] ? do_raw_read_unlock+0x70/0x70 [ 447.818181] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 447.819290] ext4_es_insert_extent+0x45d/0xf10 [ 447.820250] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 447.821177] ? ext4_es_find_extent_range+0x1cb/0x460 [ 447.822241] ? lock_downgrade+0x6d0/0x6d0 [ 447.823113] ? __ext4_handle_dirty_super+0x100/0x100 [ 447.824184] ? __es_find_extent_range+0x197/0x4b0 [ 447.825205] ? do_raw_read_unlock+0x3b/0x70 [ 447.826114] ext4_ext_map_blocks+0x1863/0x5830 [ 447.827085] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 447.828195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 447.829308] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 447.830405] ? ext4_ext_release+0x10/0x10 [ 447.831283] ? lock_release+0x680/0x680 [ 447.832123] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 447.833122] ? lock_downgrade+0x6d0/0x6d0 [ 447.834003] ? down_read+0x10f/0x430 [ 447.834780] ? down_write+0x160/0x160 [ 447.835580] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 447.836568] ext4_map_blocks+0x8e1/0x1910 [ 447.837465] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 447.838405] ? __brelse+0x84/0xa0 [ 447.839129] ? __ext4_new_inode+0x148/0x5370 [ 447.840064] ext4_append+0x1b8/0x4e0 [ 447.840849] ? ext4_move_extents+0x3050/0x3050 [ 447.841824] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 447.842844] ext4_init_new_dir+0x25e/0x4d0 [ 447.843730] ? ext4_init_dot_dotdot+0x610/0x610 [ 447.844719] ext4_mkdir+0x3c1/0xb10 [ 447.845500] ? ext4_rmdir+0xf70/0xf70 [ 447.846317] vfs_mkdir+0x493/0x750 [ 447.847066] do_mkdirat+0x150/0x2b0 [ 447.847827] ? user_path_create+0xf0/0xf0 [ 447.848696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 447.849813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 447.850901] do_syscall_64+0x33/0x40 [ 447.851690] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 447.852761] RIP: 0033:0x7f9c2c527c27 [ 447.853549] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 447.857421] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 447.859022] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 447.860515] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 447.862024] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 447.863536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 15:37:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) [ 447.865039] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:37:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 15:37:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 447.939420] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 447.961712] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:37:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 15:37:43 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 15:37:43 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) 15:37:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 448.160896] FAULT_INJECTION: forcing a failure. [ 448.160896] name failslab, interval 1, probability 0, space 0, times 0 [ 448.163639] CPU: 0 PID: 4809 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 448.165082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 448.166831] Call Trace: [ 448.167395] dump_stack+0x107/0x167 [ 448.168174] should_fail.cold+0x5/0xa [ 448.168982] ? ext4_find_extent+0xa77/0xd70 [ 448.169885] should_failslab+0x5/0x20 [ 448.170682] __kmalloc+0x72/0x390 [ 448.171420] ext4_find_extent+0xa77/0xd70 [ 448.172302] ext4_ext_map_blocks+0x1c8/0x5830 [ 448.173271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 448.174369] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 448.175486] ? ext4_ext_release+0x10/0x10 [ 448.176362] ? ext4_map_blocks+0x5cd/0x1910 [ 448.177281] ? lock_release+0x680/0x680 [ 448.178119] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 448.179113] ? lock_downgrade+0x6d0/0x6d0 [ 448.179984] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 448.181110] ? down_write+0xe0/0x160 [ 448.181890] ? down_write_killable+0x180/0x180 [ 448.182862] ext4_map_blocks+0x63f/0x1910 [ 448.183740] ? _down_write_nest_lock+0x160/0x160 [ 448.184737] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 448.185685] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 448.186680] ext4_getblk+0x144/0x680 [ 448.187466] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 448.188510] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 448.189455] ? __brelse+0x84/0xa0 [ 448.190184] ? __ext4_new_inode+0x148/0x5370 [ 448.191114] ext4_bread+0x29/0x1f0 [ 448.191859] ext4_append+0x228/0x4e0 [ 448.192652] ? ext4_move_extents+0x3050/0x3050 [ 448.193617] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 448.194643] ext4_init_new_dir+0x25e/0x4d0 [ 448.195530] ? ext4_init_dot_dotdot+0x610/0x610 [ 448.196517] ext4_mkdir+0x3c1/0xb10 [ 448.197300] ? ext4_rmdir+0xf70/0xf70 [ 448.198111] vfs_mkdir+0x493/0x750 [ 448.198861] do_mkdirat+0x150/0x2b0 [ 448.199628] ? user_path_create+0xf0/0xf0 [ 448.200509] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 448.201622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 448.202709] do_syscall_64+0x33/0x40 [ 448.203494] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 448.204574] RIP: 0033:0x7f9c2c527c27 [ 448.205370] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 448.209265] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 448.210867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 448.212370] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 448.213878] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 448.215381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 448.216886] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:37:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 448.278546] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 448.292521] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:37:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 15:37:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="f48430"]) 15:37:44 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 15:37:44 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:37:44 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 448.510479] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:00 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:00 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:00 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, 0x0) 15:38:00 executing program 7: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:38:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 15:38:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 15:38:00 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 465.160944] FAULT_INJECTION: forcing a failure. [ 465.160944] name failslab, interval 1, probability 0, space 0, times 0 [ 465.163914] CPU: 1 PID: 4857 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 465.165656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 465.167428] Call Trace: [ 465.167988] dump_stack+0x107/0x167 [ 465.168750] should_fail.cold+0x5/0xa [ 465.169559] ? create_object.isra.0+0x3a/0xa20 [ 465.170523] should_failslab+0x5/0x20 [ 465.171324] kmem_cache_alloc+0x5b/0x310 [ 465.172186] create_object.isra.0+0x3a/0xa20 [ 465.173104] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 465.174183] __kmalloc+0x16e/0x390 [ 465.174936] ext4_find_extent+0xa77/0xd70 [ 465.175818] ext4_ext_map_blocks+0x1c8/0x5830 [ 465.176783] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 465.177891] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 465.179019] ? trace_hardirqs_on+0x5b/0x180 [ 465.179929] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 465.181066] ? ext4_ext_release+0x10/0x10 [ 465.181946] ? ext4_map_blocks+0x5cd/0x1910 [ 465.182853] ? lock_release+0x680/0x680 [ 465.183693] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 465.184686] ? lock_downgrade+0x6d0/0x6d0 [ 465.185563] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 465.186676] ? down_write+0xe0/0x160 [ 465.187455] ? down_write_killable+0x180/0x180 [ 465.188430] ext4_map_blocks+0x63f/0x1910 [ 465.189312] ? _down_write_nest_lock+0x160/0x160 [ 465.190314] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 465.191254] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 465.192248] ext4_getblk+0x144/0x680 [ 465.193035] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 465.194097] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 465.195042] ? __brelse+0x84/0xa0 [ 465.195776] ? __ext4_new_inode+0x148/0x5370 [ 465.196707] ext4_bread+0x29/0x1f0 [ 465.197452] ext4_append+0x228/0x4e0 [ 465.198246] ? ext4_move_extents+0x3050/0x3050 [ 465.199205] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 465.200228] ext4_init_new_dir+0x25e/0x4d0 [ 465.201121] ? ext4_init_dot_dotdot+0x610/0x610 [ 465.202128] ext4_mkdir+0x3c1/0xb10 [ 465.202899] ? ext4_rmdir+0xf70/0xf70 [ 465.203709] vfs_mkdir+0x493/0x750 [ 465.204459] do_mkdirat+0x150/0x2b0 [ 465.205233] ? user_path_create+0xf0/0xf0 [ 465.206114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 465.207216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 465.208303] do_syscall_64+0x33/0x40 [ 465.209086] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 465.210187] RIP: 0033:0x7f9c2c527c27 [ 465.210969] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 465.214855] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 465.216457] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 465.217967] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 465.219453] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 465.220939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 465.222438] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 465.240351] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, 0x0) 15:38:00 executing program 7: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 465.246269] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:01 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) [ 465.392679] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 465.426661] FAULT_INJECTION: forcing a failure. [ 465.426661] name failslab, interval 1, probability 0, space 0, times 0 [ 465.429591] CPU: 0 PID: 4870 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 465.431275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 465.433298] Call Trace: [ 465.433964] dump_stack+0x107/0x167 [ 465.434869] should_fail.cold+0x5/0xa [ 465.435814] ? ext4_mb_new_blocks+0x698/0x45c0 [ 465.436942] should_failslab+0x5/0x20 [ 465.437902] kmem_cache_alloc+0x5b/0x310 [ 465.438912] ext4_mb_new_blocks+0x698/0x45c0 [ 465.440015] ? trace_hardirqs_on+0x5b/0x180 [ 465.441084] ? kasan_unpoison_shadow+0x33/0x50 [ 465.442314] ? ext4_cache_extents+0x68/0x2d0 [ 465.443439] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 465.444753] ? ext4_discard_preallocations+0xd80/0xd80 [ 465.446105] ? ext4_ext_search_right+0x2e3/0xbd0 [ 465.447082] ? ext4_inode_to_goal_block+0x320/0x430 [ 465.448282] ext4_ext_map_blocks+0x1d49/0x5830 [ 465.449364] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 465.450598] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 465.451831] ? ext4_ext_release+0x10/0x10 [ 465.452806] ? ext4_map_blocks+0x5cd/0x1910 [ 465.453868] ? lock_release+0x680/0x680 [ 465.454801] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 465.455901] ? lock_downgrade+0x6d0/0x6d0 [ 465.456821] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 465.457918] ? down_write_killable+0x180/0x180 [ 465.458878] ext4_map_blocks+0x63f/0x1910 [ 465.459760] ? _down_write_nest_lock+0x160/0x160 [ 465.460759] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 465.461725] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 465.462729] ext4_getblk+0x144/0x680 [ 465.463527] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 465.464580] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 465.465531] ? __brelse+0x84/0xa0 [ 465.466281] ? __ext4_new_inode+0x148/0x5370 [ 465.467225] ext4_bread+0x29/0x1f0 [ 465.467978] ext4_append+0x228/0x4e0 [ 465.468771] ? ext4_move_extents+0x3050/0x3050 [ 465.469762] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 465.470791] ext4_init_new_dir+0x25e/0x4d0 [ 465.471686] ? ext4_init_dot_dotdot+0x610/0x610 [ 465.472679] ext4_mkdir+0x3c1/0xb10 [ 465.473454] ? ext4_rmdir+0xf70/0xf70 [ 465.474282] vfs_mkdir+0x493/0x750 [ 465.475035] do_mkdirat+0x150/0x2b0 [ 465.475808] ? user_path_create+0xf0/0xf0 [ 465.476686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 465.477806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 465.478902] do_syscall_64+0x33/0x40 [ 465.479689] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 465.480774] RIP: 0033:0x7f9c2c527c27 [ 465.481575] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 465.485470] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 465.487087] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 465.488592] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 465.490113] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 465.491628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 465.493132] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 465.523559] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 482.243765] FAULT_INJECTION: forcing a failure. [ 482.243765] name failslab, interval 1, probability 0, space 0, times 0 [ 482.246049] CPU: 1 PID: 4881 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 482.247430] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 482.249089] Call Trace: [ 482.249626] dump_stack+0x107/0x167 [ 482.250369] should_fail.cold+0x5/0xa [ 482.251137] ? create_object.isra.0+0x3a/0xa20 [ 482.252266] should_failslab+0x5/0x20 [ 482.253035] kmem_cache_alloc+0x5b/0x310 [ 482.253856] create_object.isra.0+0x3a/0xa20 [ 482.254748] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 482.255774] kmem_cache_alloc+0x159/0x310 15:38:17 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:17 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 15:38:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, 0x0) 15:38:17 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:17 executing program 7: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:38:17 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:17 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 482.256770] ext4_mb_new_blocks+0x698/0x45c0 [ 482.257861] ? trace_hardirqs_on+0x5b/0x180 [ 482.258740] ? kasan_unpoison_shadow+0x33/0x50 [ 482.259723] ? ext4_cache_extents+0x68/0x2d0 [ 482.260605] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 482.261626] ? ext4_discard_preallocations+0xd80/0xd80 [ 482.262691] ? ext4_ext_search_right+0x2e3/0xbd0 [ 482.263643] ? ext4_inode_to_goal_block+0x320/0x430 [ 482.264655] ext4_ext_map_blocks+0x1d49/0x5830 [ 482.265593] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 482.266656] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 482.267720] ? ext4_ext_release+0x10/0x10 [ 482.268557] ? ext4_map_blocks+0x5cd/0x1910 [ 482.269431] ? lock_release+0x680/0x680 [ 482.270237] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 482.271191] ? lock_downgrade+0x6d0/0x6d0 [ 482.272024] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 482.273096] ? down_write_killable+0x180/0x180 [ 482.274024] ext4_map_blocks+0x63f/0x1910 [ 482.274870] ? _down_write_nest_lock+0x160/0x160 [ 482.275820] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 482.276720] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 482.277672] ext4_getblk+0x144/0x680 [ 482.278434] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 482.279435] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 482.280337] ? __brelse+0x84/0xa0 [ 482.281034] ? __ext4_new_inode+0x148/0x5370 [ 482.281924] ext4_bread+0x29/0x1f0 [ 482.282674] ext4_append+0x228/0x4e0 [ 482.283427] ? ext4_move_extents+0x3050/0x3050 [ 482.284352] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 482.285333] ext4_init_new_dir+0x25e/0x4d0 [ 482.286194] ? ext4_init_dot_dotdot+0x610/0x610 [ 482.287146] ext4_mkdir+0x3c1/0xb10 [ 482.287888] ? ext4_rmdir+0xf70/0xf70 [ 482.288665] vfs_mkdir+0x493/0x750 [ 482.289388] do_mkdirat+0x150/0x2b0 [ 482.290134] ? user_path_create+0xf0/0xf0 [ 482.290973] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 482.292031] ? syscall_enter_from_user_mode+0x1d/0x50 [ 482.293064] do_syscall_64+0x33/0x40 [ 482.293813] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 482.294848] RIP: 0033:0x7f9c2c527c27 [ 482.295593] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.299334] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 482.300862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 482.302313] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 482.303742] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 482.305178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 482.306620] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 482.322703] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:18 executing program 7: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) [ 482.383682] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 482.405502] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:18 executing program 7: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:38:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[]) [ 482.423468] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) [ 482.499143] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 482.577510] FAULT_INJECTION: forcing a failure. [ 482.577510] name failslab, interval 1, probability 0, space 0, times 0 [ 482.579930] CPU: 0 PID: 4910 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 482.581348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 482.583094] Call Trace: [ 482.583644] dump_stack+0x107/0x167 [ 482.584396] should_fail.cold+0x5/0xa [ 482.585185] ? create_object.isra.0+0x3a/0xa20 [ 482.586148] should_failslab+0x5/0x20 [ 482.586372] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 482.586944] kmem_cache_alloc+0x5b/0x310 [ 482.589267] create_object.isra.0+0x3a/0xa20 [ 482.590250] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 482.591392] kmem_cache_alloc+0x159/0x310 [ 482.592318] ext4_mb_new_blocks+0x698/0x45c0 [ 482.593303] ? trace_hardirqs_on+0x5b/0x180 [ 482.594271] ? kasan_unpoison_shadow+0x33/0x50 [ 482.595252] ? ext4_cache_extents+0x68/0x2d0 [ 482.596187] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 482.597383] ? ext4_discard_preallocations+0xd80/0xd80 [ 482.598570] ? ext4_ext_search_right+0x2e3/0xbd0 [ 482.599563] ? ext4_inode_to_goal_block+0x320/0x430 [ 482.600674] ext4_ext_map_blocks+0x1d49/0x5830 [ 482.601712] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 482.602914] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 482.604084] ? ext4_ext_release+0x10/0x10 [ 482.605007] ? ext4_map_blocks+0x5cd/0x1910 [ 482.605972] ? lock_release+0x680/0x680 [ 482.606945] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 482.608090] ? lock_downgrade+0x6d0/0x6d0 [ 482.609097] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 482.611497] ? down_write_killable+0x180/0x180 [ 482.612603] ext4_map_blocks+0x63f/0x1910 [ 482.613598] ? _down_write_nest_lock+0x160/0x160 [ 482.614751] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 482.615842] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 482.617033] ext4_getblk+0x144/0x680 [ 482.617963] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 482.619204] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 482.620312] ? __brelse+0x84/0xa0 [ 482.621182] ? __ext4_new_inode+0x148/0x5370 [ 482.622307] ext4_bread+0x29/0x1f0 [ 482.623206] ext4_append+0x228/0x4e0 [ 482.624152] ? ext4_move_extents+0x3050/0x3050 [ 482.625300] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 482.626432] ext4_init_new_dir+0x25e/0x4d0 [ 482.627434] ? ext4_init_dot_dotdot+0x610/0x610 [ 482.628637] ext4_mkdir+0x3c1/0xb10 [ 482.629575] ? ext4_rmdir+0xf70/0xf70 [ 482.630565] vfs_mkdir+0x493/0x750 [ 482.631471] do_mkdirat+0x150/0x2b0 [ 482.632408] ? user_path_create+0xf0/0xf0 [ 482.633462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 482.634800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 482.636118] do_syscall_64+0x33/0x40 [ 482.637067] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 482.638376] RIP: 0033:0x7f9c2c527c27 [ 482.639323] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.644002] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 482.645923] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 482.647754] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 482.649592] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 482.651411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 482.653254] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:38:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 15:38:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[]) 15:38:33 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:33 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:33 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:33 executing program 7: syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(0xffffffffffffffff, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 15:38:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 498.153042] FAULT_INJECTION: forcing a failure. [ 498.153042] name failslab, interval 1, probability 0, space 0, times 0 [ 498.156029] CPU: 0 PID: 4927 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 498.157824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 498.159985] Call Trace: [ 498.160664] dump_stack+0x107/0x167 [ 498.161655] should_fail.cold+0x5/0xa [ 498.162640] ? create_object.isra.0+0x3a/0xa20 [ 498.163829] should_failslab+0x5/0x20 [ 498.164807] kmem_cache_alloc+0x5b/0x310 [ 498.165908] create_object.isra.0+0x3a/0xa20 [ 498.167067] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 498.168376] kmem_cache_alloc+0x159/0x310 [ 498.169471] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 498.170684] ? trace_hardirqs_on+0x5b/0x180 [ 498.171788] ? kasan_unpoison_shadow+0x33/0x50 [ 498.172947] ? ext4_cache_extents+0x68/0x2d0 [ 498.174110] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 498.175329] ? ext4_discard_preallocations+0xd80/0xd80 [ 498.176433] ? ext4_ext_search_right+0x2e3/0xbd0 [ 498.177448] ? ext4_inode_to_goal_block+0x320/0x430 [ 498.178582] ext4_ext_map_blocks+0x1d49/0x5830 [ 498.179612] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 498.180728] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 498.181850] ? ext4_ext_release+0x10/0x10 [ 498.182796] ? ext4_map_blocks+0x5cd/0x1910 [ 498.183709] ? lock_release+0x680/0x680 [ 498.184561] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 498.185568] ? lock_downgrade+0x6d0/0x6d0 [ 498.186459] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 498.187616] ? down_write_killable+0x180/0x180 [ 498.188590] ext4_map_blocks+0x63f/0x1910 [ 498.189471] ? _down_write_nest_lock+0x160/0x160 [ 498.190320] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 498.190508] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 498.192685] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 498.193700] ext4_getblk+0x144/0x680 [ 498.194528] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 498.195614] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 498.196566] ? __brelse+0x84/0xa0 [ 498.197304] ? __ext4_new_inode+0x148/0x5370 [ 498.198237] ext4_bread+0x29/0x1f0 [ 498.199054] ext4_append+0x228/0x4e0 [ 498.199849] ? ext4_move_extents+0x3050/0x3050 [ 498.200812] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 498.201837] ext4_init_new_dir+0x25e/0x4d0 [ 498.202792] ? ext4_init_dot_dotdot+0x610/0x610 [ 498.203792] ext4_mkdir+0x3c1/0xb10 [ 498.204571] ? ext4_rmdir+0xf70/0xf70 [ 498.205389] vfs_mkdir+0x493/0x750 [ 498.206141] do_mkdirat+0x150/0x2b0 [ 498.206967] ? user_path_create+0xf0/0xf0 [ 498.207857] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 498.208965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 498.210068] do_syscall_64+0x33/0x40 [ 498.210920] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 498.212005] RIP: 0033:0x7f9c2c527c27 [ 498.212788] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 498.216707] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 498.218312] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 498.219878] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 498.221388] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 498.222993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 498.224500] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:38:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[]) [ 498.309394] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 498.323634] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 15:38:34 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, 0x0, 0x0) [ 498.335608] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 498.351557] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 498.354730] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 15:38:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) 15:38:34 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:34 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:34 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:34 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:34 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, 0x0, 0x0) [ 498.539538] FAULT_INJECTION: forcing a failure. [ 498.539538] name failslab, interval 1, probability 0, space 0, times 0 [ 498.541911] CPU: 0 PID: 4948 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 498.543342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 498.545074] Call Trace: [ 498.545624] dump_stack+0x107/0x167 [ 498.546388] should_fail.cold+0x5/0xa [ 498.547191] ? create_object.isra.0+0x3a/0xa20 [ 498.548244] should_failslab+0x5/0x20 [ 498.549270] kmem_cache_alloc+0x5b/0x310 [ 498.550242] create_object.isra.0+0x3a/0xa20 [ 498.551203] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 498.552304] kmem_cache_alloc+0x159/0x310 [ 498.553208] ext4_mb_new_blocks+0x698/0x45c0 [ 498.554192] ? trace_hardirqs_on+0x5b/0x180 [ 498.555104] ? kasan_unpoison_shadow+0x33/0x50 [ 498.556051] ? ext4_cache_extents+0x68/0x2d0 [ 498.556959] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 498.558013] ? ext4_discard_preallocations+0xd80/0xd80 [ 498.559121] ? ext4_ext_search_right+0x2e3/0xbd0 [ 498.560111] ? ext4_inode_to_goal_block+0x320/0x430 [ 498.561155] ext4_ext_map_blocks+0x1d49/0x5830 [ 498.562126] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 498.563252] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 498.564349] ? ext4_ext_release+0x10/0x10 [ 498.565212] ? ext4_map_blocks+0x5cd/0x1910 [ 498.566114] ? lock_release+0x680/0x680 [ 498.566948] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 498.567931] ? lock_downgrade+0x6d0/0x6d0 [ 498.568789] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 498.569928] ? down_write_killable+0x180/0x180 [ 498.570948] ext4_map_blocks+0x63f/0x1910 [ 498.571847] ? _down_write_nest_lock+0x160/0x160 [ 498.572873] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 498.573857] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 498.574896] ext4_getblk+0x144/0x680 [ 498.575715] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 498.576783] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 498.577758] ? __brelse+0x84/0xa0 [ 498.578485] ? __ext4_new_inode+0x148/0x5370 [ 498.579420] ext4_bread+0x29/0x1f0 [ 498.580161] ext4_append+0x228/0x4e0 [ 498.580939] ? ext4_move_extents+0x3050/0x3050 [ 498.581897] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 498.582930] ext4_init_new_dir+0x25e/0x4d0 [ 498.583818] ? ext4_init_dot_dotdot+0x610/0x610 [ 498.584810] ext4_mkdir+0x3c1/0xb10 [ 498.585578] ? ext4_rmdir+0xf70/0xf70 [ 498.586382] vfs_mkdir+0x493/0x750 [ 498.587139] do_mkdirat+0x150/0x2b0 [ 498.587905] ? user_path_create+0xf0/0xf0 [ 498.588774] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 498.589871] ? syscall_enter_from_user_mode+0x1d/0x50 [ 498.590955] do_syscall_64+0x33/0x40 [ 498.591729] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 498.592804] RIP: 0033:0x7f9c2c527c27 [ 498.593577] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 498.597444] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 498.599040] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 498.600684] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 498.602466] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 498.604245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 498.606019] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 498.684749] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 498.847621] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 498.893451] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 498.902570] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 15:38:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) 15:38:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, 0x0, 0x0) 15:38:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:51 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:51 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 515.968584] FAULT_INJECTION: forcing a failure. [ 515.968584] name failslab, interval 1, probability 0, space 0, times 0 [ 515.971220] CPU: 1 PID: 4981 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 515.972693] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 515.974468] Call Trace: [ 515.975034] dump_stack+0x107/0x167 [ 515.975826] should_fail.cold+0x5/0xa [ 515.976646] ? create_object.isra.0+0x3a/0xa20 [ 515.977629] should_failslab+0x5/0x20 [ 515.978446] kmem_cache_alloc+0x5b/0x310 [ 515.979326] create_object.isra.0+0x3a/0xa20 [ 515.980263] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 515.980973] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 515.981357] kmem_cache_alloc+0x159/0x310 [ 515.983782] __es_insert_extent+0xed1/0x1370 [ 515.984741] ext4_es_insert_extent+0x45d/0xf10 [ 515.985923] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 515.986847] ? lock_downgrade+0x6d0/0x6d0 [ 515.987767] ? down_write_killable+0x180/0x180 [ 515.988766] ext4_map_blocks+0x80b/0x1910 [ 515.989664] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 515.990626] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 515.991679] ext4_getblk+0x144/0x680 [ 515.992481] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 515.993556] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 515.994529] ? __brelse+0x84/0xa0 [ 515.995282] ? __ext4_new_inode+0x148/0x5370 [ 515.996237] ext4_bread+0x29/0x1f0 [ 515.997005] ext4_append+0x228/0x4e0 [ 515.997807] ? ext4_move_extents+0x3050/0x3050 [ 515.998789] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 515.999847] ext4_init_new_dir+0x25e/0x4d0 [ 516.000757] ? ext4_init_dot_dotdot+0x610/0x610 [ 516.001770] ext4_mkdir+0x3c1/0xb10 [ 516.002563] ? ext4_rmdir+0xf70/0xf70 [ 516.003402] vfs_mkdir+0x493/0x750 [ 516.004168] do_mkdirat+0x150/0x2b0 [ 516.004951] ? user_path_create+0xf0/0xf0 [ 516.005848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 516.006971] ? syscall_enter_from_user_mode+0x1d/0x50 [ 516.008086] do_syscall_64+0x33/0x40 [ 516.008884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 516.009981] RIP: 0033:0x7f9c2c527c27 [ 516.010774] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 516.014731] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 516.016368] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 516.017897] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 516.019435] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 516.020963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.022492] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:38:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600), 0x0) 15:38:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) [ 516.099894] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:38:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 15:38:51 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:38:51 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600), 0x0) [ 516.182597] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 516.185772] FAULT_INJECTION: forcing a failure. [ 516.185772] name failslab, interval 1, probability 0, space 0, times 0 [ 516.188513] CPU: 1 PID: 4998 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 516.189972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 516.191755] Call Trace: [ 516.192322] dump_stack+0x107/0x167 [ 516.193103] should_fail.cold+0x5/0xa [ 516.193930] ? jbd2_journal_add_journal_head+0x1a3/0x540 [ 516.195092] should_failslab+0x5/0x20 [ 516.195963] kmem_cache_alloc+0x5b/0x310 [ 516.196852] jbd2_journal_add_journal_head+0x1a3/0x540 [ 516.197981] jbd2_journal_get_create_access+0x40/0x560 [ 516.199117] __ext4_journal_get_create_access+0x43/0x90 [ 516.200277] ext4_getblk+0x318/0x680 [ 516.201080] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 516.202149] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 516.203112] ? __brelse+0x84/0xa0 [ 516.203863] ? __ext4_new_inode+0x148/0x5370 [ 516.204812] ext4_bread+0x29/0x1f0 [ 516.205573] ext4_append+0x228/0x4e0 [ 516.206374] ? ext4_move_extents+0x3050/0x3050 [ 516.207361] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 516.208404] ext4_init_new_dir+0x25e/0x4d0 [ 516.209314] ? ext4_init_dot_dotdot+0x610/0x610 [ 516.210329] ext4_mkdir+0x3c1/0xb10 [ 516.211116] ? ext4_rmdir+0xf70/0xf70 [ 516.211952] vfs_mkdir+0x493/0x750 [ 516.212721] do_mkdirat+0x150/0x2b0 [ 516.213504] ? user_path_create+0xf0/0xf0 [ 516.214399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 516.215536] ? syscall_enter_from_user_mode+0x1d/0x50 [ 516.216645] do_syscall_64+0x33/0x40 [ 516.217444] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 516.218542] RIP: 0033:0x7f9c2c527c27 [ 516.219348] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 516.223314] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 516.224925] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 516.226411] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 516.227903] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 516.229377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.230853] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 516.232563] ENOMEM in journal_alloc_journal_head, retrying. [ 516.257541] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600), 0x0) 15:39:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 15:39:05 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB="f484"]) 15:39:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 529.899062] FAULT_INJECTION: forcing a failure. [ 529.899062] name failslab, interval 1, probability 0, space 0, times 0 [ 529.901540] CPU: 0 PID: 5019 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 529.902999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 529.904778] Call Trace: [ 529.905347] dump_stack+0x107/0x167 [ 529.906128] should_fail.cold+0x5/0xa [ 529.906947] ? create_object.isra.0+0x3a/0xa20 [ 529.907936] should_failslab+0x5/0x20 [ 529.908753] kmem_cache_alloc+0x5b/0x310 [ 529.909630] create_object.isra.0+0x3a/0xa20 [ 529.910566] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 529.911657] kmem_cache_alloc+0x159/0x310 [ 529.912569] jbd2_journal_add_journal_head+0x1a3/0x540 [ 529.913695] jbd2_journal_get_create_access+0x40/0x560 [ 529.914809] __ext4_journal_get_create_access+0x43/0x90 [ 529.915980] ext4_getblk+0x318/0x680 [ 529.916768] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 529.917826] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 529.918776] ? __brelse+0x84/0xa0 [ 529.919518] ? __ext4_new_inode+0x148/0x5370 [ 529.920469] ext4_bread+0x29/0x1f0 [ 529.921228] ext4_append+0x228/0x4e0 [ 529.922015] ? ext4_move_extents+0x3050/0x3050 [ 529.922993] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 529.924039] ext4_init_new_dir+0x25e/0x4d0 [ 529.924945] ? ext4_init_dot_dotdot+0x610/0x610 [ 529.925942] ext4_mkdir+0x3c1/0xb10 [ 529.926723] ? ext4_rmdir+0xf70/0xf70 [ 529.927530] vfs_mkdir+0x493/0x750 [ 529.928293] do_mkdirat+0x150/0x2b0 [ 529.929063] ? user_path_create+0xf0/0xf0 [ 529.929942] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 529.931038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 529.932130] do_syscall_64+0x33/0x40 [ 529.932910] entry_SYSCALL_64_after_hwframe+0x67/0xd1 15:39:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) [ 529.934107] RIP: 0033:0x7f9c2c527c27 [ 529.934916] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.938769] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 529.940364] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9c2c527c27 [ 529.941849] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 529.943334] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 529.944827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.946312] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 529.958160] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 529.960339] EXT4-fs (sda): Unrecognized mount option "ô„" or missing value [ 529.978336] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB="f4"]) 15:39:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 15:39:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 530.072535] FAULT_INJECTION: forcing a failure. [ 530.072535] name failslab, interval 1, probability 0, space 0, times 0 [ 530.073971] CPU: 1 PID: 5038 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 530.074749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 530.075683] Call Trace: [ 530.076000] dump_stack+0x107/0x167 [ 530.076410] should_fail.cold+0x5/0xa [ 530.076840] ? lock_acquire+0x197/0x470 [ 530.077290] ? __sigqueue_alloc+0x1ed/0x5c0 [ 530.077781] should_failslab+0x5/0x20 [ 530.078209] kmem_cache_alloc+0x5b/0x310 [ 530.078679] __sigqueue_alloc+0x1ed/0x5c0 [ 530.079161] __send_signal+0x6f5/0x11e0 [ 530.079613] force_sig_info_to_task+0x2a0/0x3b0 [ 530.080151] force_sig_fault+0xb0/0xf0 [ 530.080589] ? force_sig_fault_to_task+0xf0/0xf0 [ 530.081133] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 530.081766] ? _down_write_nest_lock+0x160/0x160 [ 530.082309] ? down_read_trylock+0x193/0x350 [ 530.082806] __bad_area_nosemaphore+0x268/0x310 [ 530.083340] do_user_addr_fault+0x7f9/0xc60 [ 530.083847] exc_page_fault+0xa2/0x1a0 [ 530.084285] ? asm_exc_page_fault+0x8/0x30 [ 530.084760] asm_exc_page_fault+0x1e/0x30 [ 530.085229] RIP: 0033:0x7f9c2c5187b6 [ 530.085647] Code: 00 00 00 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 530.087741] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00010293 [ 530.088353] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 530.089163] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 530.089982] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 530.090790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 530.091602] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 530.095560] EXT4-fs (sda): Unrecognized mount option "ô" or missing value 15:39:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) [ 530.122164] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) 15:39:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 530.189300] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r0, &(0x7f0000001600)=[{0x0}], 0x1) [ 530.201414] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 15:39:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:05 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 530.295755] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 15:39:18 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:18 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:18 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) 15:39:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 542.914855] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 15:39:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 542.936742] FAULT_INJECTION: forcing a failure. [ 542.936742] name failslab, interval 1, probability 0, space 0, times 0 [ 542.939111] CPU: 0 PID: 5091 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 542.940546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 542.942277] Call Trace: [ 542.942831] dump_stack+0x107/0x167 [ 542.943596] should_fail.cold+0x5/0xa [ 542.944406] ? create_object.isra.0+0x3a/0xa20 [ 542.945363] should_failslab+0x5/0x20 [ 542.946159] kmem_cache_alloc+0x5b/0x310 [ 542.947012] create_object.isra.0+0x3a/0xa20 [ 542.947928] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 542.948999] kmem_cache_alloc+0x159/0x310 [ 542.949874] __sigqueue_alloc+0x1ed/0x5c0 [ 542.950743] __send_signal+0x6f5/0x11e0 [ 542.951579] force_sig_info_to_task+0x2a0/0x3b0 [ 542.952568] force_sig_fault+0xb0/0xf0 [ 542.953378] ? force_sig_fault_to_task+0xf0/0xf0 [ 542.954366] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 542.955541] ? _down_write_nest_lock+0x160/0x160 [ 542.956542] ? down_read_trylock+0x193/0x350 [ 542.957464] __bad_area_nosemaphore+0x268/0x310 [ 542.958441] do_user_addr_fault+0x7f9/0xc60 15:39:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000200)=ANY=[@ANYBLOB]) [ 542.959351] exc_page_fault+0xa2/0x1a0 [ 542.960313] ? asm_exc_page_fault+0x8/0x30 [ 542.961161] asm_exc_page_fault+0x1e/0x30 [ 542.962000] RIP: 0033:0x7f9c2c5187b6 [ 542.962748] Code: 00 00 00 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 542.966518] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00010293 [ 542.967614] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 542.969077] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 542.970527] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 542.971982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 542.973540] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 15:39:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) [ 543.023581] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 543.115606] FAULT_INJECTION: forcing a failure. [ 543.115606] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 543.117304] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 543.118123] CPU: 0 PID: 5107 Comm: syz-executor.4 Not tainted 5.10.233 #1 [ 543.118132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 543.118137] Call Trace: [ 543.118160] dump_stack+0x107/0x167 [ 543.118183] should_fail.cold+0x5/0xa [ 543.125875] copy_fpstate_to_sigframe+0x823/0x9e0 [ 543.126889] ? __fpu__restore_sig+0x12e0/0x12e0 [ 543.127868] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 543.128941] arch_do_signal_or_restart+0x1087/0x1990 [ 543.130006] ? force_sig_fault+0xb0/0xf0 [ 543.130860] ? force_sig_fault_to_task+0xf0/0xf0 [ 543.131854] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 543.133028] ? restore_sigcontext+0x630/0x630 [ 543.133965] ? _down_write_nest_lock+0x160/0x160 [ 543.134956] ? down_read_trylock+0x193/0x350 [ 543.135901] exit_to_user_mode_prepare+0x10f/0x190 [ 543.136946] irqentry_exit_to_user_mode+0x5/0x30 [ 543.137937] exc_page_fault+0xca/0x1a0 [ 543.138751] ? asm_exc_page_fault+0x8/0x30 [ 543.139635] asm_exc_page_fault+0x1e/0x30 [ 543.140508] RIP: 0033:0x7f9c2c5187b6 [ 543.141288] Code: 00 00 00 00 66 0f ef c0 66 0f ef c9 66 0f ef d2 66 0f ef db 48 89 f8 48 89 f9 48 81 e1 ff 0f 00 00 48 81 f9 cf 0f 00 00 77 6a 0f 6f 20 66 0f 74 e0 66 0f d7 d4 85 d2 74 04 0f bc c2 c3 48 83 [ 543.145157] RSP: 002b:00007f9c29a9dfa8 EFLAGS: 00010293 [ 543.146272] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 543.147770] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000000000000 [ 543.149268] RBP: 00007f9c29a9e040 R08: 0000000000000000 R09: 0000000000000000 [ 543.150758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 543.152253] R13: 00000000200001c0 R14: 00007f9c29a9e000 R15: 0000000000000000 [ 543.161753] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 15:39:32 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:39:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 556.639796] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:32 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) [ 556.652301] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 556.659755] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 556.845402] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 556.860506] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 15:39:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) [ 570.884897] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 570.890509] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 570.908465] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:39:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) 15:39:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:46 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 15:39:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 15:39:59 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:39:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) 15:40:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, 0x0) 15:40:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, 0x0) 15:40:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 15:40:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, 0x0) 15:40:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x21, 0x0, 0x0, 0x0, 0x0) 15:40:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:29 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 613.329354] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:29 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 613.364334] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:29 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x24, 0x0, 0x0, 0x0, 0x0) 15:40:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x30, 0x0, 0x0, 0x0, 0x0) 15:40:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 627.767482] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 627.801344] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 627.815880] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 643.716965] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 643.735310] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:40:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x64, 0x0, 0x0, 0x0, 0x0) 15:40:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:40:59 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7e, 0x0, 0x0, 0x0, 0x0) 15:41:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0, 0x0, 0x0, 0x0, 0x0) 15:41:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x112, 0x0, 0x0, 0x0, 0x0) 15:41:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x281, 0x0, 0x0, 0x0, 0x0) 15:41:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:41:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 15:41:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:41:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 690.924310] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:41:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x321, 0x0, 0x0, 0x0, 0x0) 15:41:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:41:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:41:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 690.994497] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:41:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 691.057416] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 691.065032] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:41:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:41:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x330, 0x0, 0x0, 0x0, 0x0) 15:41:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:41:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:41:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 691.196446] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 691.205189] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 691.239248] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 691.255236] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:42:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:42:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x430, 0x0, 0x0, 0x0, 0x0) 15:42:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:42:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 711.195696] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue [ 711.214667] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 711.221092] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 711.226959] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:42:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x480, 0x0, 0x0, 0x0, 0x0) 15:42:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:42:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) 15:42:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 711.441650] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 711.449513] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 711.457706] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue 15:42:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 15:42:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) 15:42:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) [ 728.405903] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 728.425200] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue 15:42:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x555, 0x0, 0x0, 0x0, 0x0) 15:42:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 15:42:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:42:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) 15:42:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 743.161991] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue 15:42:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) [ 743.184372] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue 15:42:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:42:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 15:42:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) [ 743.258693] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:42:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:42:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, 0x0) 15:42:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, 0x0) 15:42:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 743.382189] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue 15:42:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, 0x0) 15:42:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:42:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:42:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1201, 0x0, 0x0, 0x0, 0x0) [ 758.004598] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 758.026414] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:42:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:42:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:42:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) [ 758.127693] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:42:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:42:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 15:42:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:42:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 758.254940] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 758.317702] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:43:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:43:09 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) [ 773.414931] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:43:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2103, 0x0, 0x0, 0x0, 0x0) 15:43:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:43:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 773.444959] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 773.454399] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:43:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2400, 0x0, 0x0, 0x0, 0x0) 15:43:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:43:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:43:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) [ 773.590269] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 773.609314] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 773.617203] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 773.648699] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue 15:43:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', 0x0, 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) 15:43:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:43:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:43:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3000, 0x0, 0x0, 0x0, 0x0) 15:43:24 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 788.343047] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 788.369235] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue [ 788.378186] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue [ 788.386095] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:43:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3003, 0x0, 0x0, 0x0, 0x0) [ 788.407326] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 788.441539] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:43:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) 15:43:24 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) [ 788.491924] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:43:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) 15:43:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 788.528944] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue [ 788.550702] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 788.580215] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 804.788606] EXT4-fs: 2 callbacks suppressed [ 804.788621] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue 15:43:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:43:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) 15:43:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3004, 0x0, 0x0, 0x0, 0x0) 15:43:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) [ 804.832822] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 804.842053] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue [ 804.847921] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue 15:43:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 15:43:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:43:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:43:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) [ 804.938354] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 804.950691] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 804.970301] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue 15:43:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 805.035227] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue [ 805.054951] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:43:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 15:43:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 805.099295] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:43:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:43:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5505, 0x0, 0x0, 0x0, 0x0) 15:43:56 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) r4 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) preadv(r4, 0x0, 0x0, 0x401, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:43:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) [ 820.481526] EXT4-fs: 3 callbacks suppressed [ 820.481537] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 820.493107] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 820.500170] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:43:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:43:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:43:56 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) 15:43:56 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 820.686188] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 820.718315] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue 15:44:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) 15:44:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) 15:44:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) 15:44:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:44:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60ff, 0x0, 0x0, 0x0, 0x0) 15:44:13 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) r5 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) preadv(r5, 0x0, 0x0, 0x401, 0x0) stat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) sendfile(r4, r7, &(0x7f00000019c0)=0x4, 0x6a) setresuid(0xffffffffffffffff, r6, 0x0) 15:44:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:44:13 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x442, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xa}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000001980)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x400cc0, 0xa6) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x80, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x7, &(0x7f0000001700)=[{&(0x7f00000003c0)="57a2582cdd965001", 0x8, 0x6}, {&(0x7f0000000400)="1d6fd596c6", 0x5, 0xf}, {&(0x7f00000014c0)="6061d2081cc5948e9ba1d65d1417c2ef93075d399045b37201e4135af0f364897c4255811a625818530a51b9c5e7e6c90b3cde8f4b94751aec1de4227abe4e7f77bd784ac327f3365ca60089c15542f5ac3abc055a34d64cdabaeac96ac4aee134de22b28e3fe249065b186a13b4a3d75a1e8bda17039c452457d59747a9e84bf58218fb86c85c47bd5b", 0x8a, 0x7}, {&(0x7f0000000440), 0x0, 0x9}, {&(0x7f0000000480)="5d127763e7ce4455fa1961fb0e581da60b4a6c4e191066cead7450c75a8e1811a811eb28a8223907f857a664a6015c5d3303189b3bf093", 0x37, 0xdfd}, {&(0x7f00000017c0)="6b7683ef39b22f3b5de3f25fd298182ea9cc23c7074aa1d831815c205a13b293e1afc96db73e2081e01e1400000000000000000000000000006e0a60c4116e4506c679f4", 0x44, 0x4}, {&(0x7f0000001a00)="30bfc96404cf2b424c10f789919be03fb1c12bf749a8c032f1b1261e1b76f3b10f821d52ef99edb68da01c65518583281bf04060c20c5b2c5ce940622d28cc4c81250532380f13ac73be2750316af2d04e0a17181398f9036d7454b65e1f79762bb93d03badaeb431f5da3f0793c78514b2681803e68e0807901b1858fdb5c2b941f2998fafb1e0eb40de5856059fdff39daa96b69dfbb931687a69e6ed80f4d31aab4409ce15fea", 0xa8, 0x80000001}], 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe={'stripe', 0x3d, 0x4}}]}) [ 837.310173] FAULT_INJECTION: forcing a failure. [ 837.310173] name failslab, interval 1, probability 0, space 0, times 0 [ 837.313316] CPU: 0 PID: 5993 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 837.315211] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.317556] Call Trace: [ 837.318287] dump_stack+0x107/0x167 [ 837.319313] should_fail.cold+0x5/0xa [ 837.320374] ? getname_flags.part.0+0x50/0x4f0 [ 837.321662] should_failslab+0x5/0x20 [ 837.322728] kmem_cache_alloc+0x5b/0x310 [ 837.323892] getname_flags.part.0+0x50/0x4f0 [ 837.325113] getname_flags+0x9a/0xe0 [ 837.326145] do_mkdirat+0x8f/0x2b0 [ 837.327144] ? user_path_create+0xf0/0xf0 [ 837.328298] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.329770] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.331191] do_syscall_64+0x33/0x40 [ 837.332057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.333258] RIP: 0033:0x7ff67ee7ac27 [ 837.334129] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.338686] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.339959] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7ac27 [ 837.341012] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.342060] RBP: 00007ff67c3f1040 R08: 0000000000000000 R09: 0000000000388460 [ 837.343108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.344039] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 837.351913] FAULT_INJECTION: forcing a failure. [ 837.351913] name failslab, interval 1, probability 0, space 0, times 0 [ 837.353411] CPU: 0 PID: 6004 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 837.354336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.355450] Call Trace: [ 837.355803] dump_stack+0x107/0x167 [ 837.356294] should_fail.cold+0x5/0xa [ 837.356798] ? getname_flags.part.0+0x50/0x4f0 [ 837.357411] should_failslab+0x5/0x20 [ 837.357911] kmem_cache_alloc+0x5b/0x310 [ 837.358462] getname_flags.part.0+0x50/0x4f0 [ 837.359036] getname_flags+0x9a/0xe0 [ 837.359548] do_mkdirat+0x8f/0x2b0 [ 837.360029] ? user_path_create+0xf0/0xf0 [ 837.360592] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.361303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.361987] do_syscall_64+0x33/0x40 [ 837.362502] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.363188] RIP: 0033:0x7f1dc49e2c27 [ 837.363684] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.366150] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.367158] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e2c27 [ 837.368098] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.369036] RBP: 00007f1dc1f59040 R08: 0000000000000000 R09: 0000000000388460 [ 837.369998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.370969] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:44:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, 0x0) 15:44:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6400, 0x0, 0x0, 0x0, 0x0) 15:44:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) [ 837.379211] FAULT_INJECTION: forcing a failure. [ 837.379211] name failslab, interval 1, probability 0, space 0, times 0 [ 837.381674] CPU: 1 PID: 6005 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 837.383127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.384898] Call Trace: [ 837.385460] dump_stack+0x107/0x167 [ 837.386239] should_fail.cold+0x5/0xa [ 837.387073] ? getname_flags.part.0+0x50/0x4f0 [ 837.388060] should_failslab+0x5/0x20 [ 837.388876] kmem_cache_alloc+0x5b/0x310 [ 837.389726] getname_flags.part.0+0x50/0x4f0 [ 837.390657] getname_flags+0x9a/0xe0 [ 837.391440] do_mkdirat+0x8f/0x2b0 [ 837.392204] ? user_path_create+0xf0/0xf0 [ 837.393096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.394195] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.395288] do_syscall_64+0x33/0x40 [ 837.396066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.397134] RIP: 0033:0x7f1a21ab7c27 [ 837.397911] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.401787] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.403402] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21ab7c27 [ 837.404910] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.406415] RBP: 00007f1a1f02e040 R08: 0000000000000000 R09: 0000000000388460 [ 837.407912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.409409] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 837.419117] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 837.421300] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.424661] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.426043] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.435145] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000004,,errors=continue [ 837.478005] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:44:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:44:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:44:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:44:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7e00, 0x0, 0x0, 0x0, 0x0) 15:44:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) [ 837.551674] FAULT_INJECTION: forcing a failure. [ 837.551674] name failslab, interval 1, probability 0, space 0, times 0 [ 837.553141] CPU: 0 PID: 6019 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 837.554009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.555063] Call Trace: [ 837.555400] dump_stack+0x107/0x167 [ 837.555863] should_fail.cold+0x5/0xa [ 837.556351] ? create_object.isra.0+0x3a/0xa20 [ 837.556936] should_failslab+0x5/0x20 [ 837.557411] kmem_cache_alloc+0x5b/0x310 [ 837.557924] ? ksys_write+0x21a/0x260 [ 837.558423] create_object.isra.0+0x3a/0xa20 [ 837.558997] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 837.559654] kmem_cache_alloc+0x159/0x310 [ 837.560194] getname_flags.part.0+0x50/0x4f0 [ 837.560768] getname_flags+0x9a/0xe0 [ 837.561246] do_mkdirat+0x8f/0x2b0 [ 837.561700] ? user_path_create+0xf0/0xf0 [ 837.562236] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.562908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.563561] do_syscall_64+0x33/0x40 [ 837.564027] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.564667] RIP: 0033:0x7f1a21ab7c27 [ 837.565135] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.567450] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.568404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21ab7c27 [ 837.569295] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.570187] RBP: 00007f1a1f02e040 R08: 0000000000000000 R09: 0000000000388460 [ 837.571090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.572034] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 837.584606] FAULT_INJECTION: forcing a failure. [ 837.584606] name failslab, interval 1, probability 0, space 0, times 0 [ 837.586061] CPU: 0 PID: 6021 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 837.586937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.587985] Call Trace: [ 837.588325] dump_stack+0x107/0x167 [ 837.588790] should_fail.cold+0x5/0xa [ 837.589274] ? create_object.isra.0+0x3a/0xa20 [ 837.589870] should_failslab+0x5/0x20 [ 837.590364] kmem_cache_alloc+0x5b/0x310 [ 837.590878] ? ksys_write+0x21a/0x260 [ 837.591363] create_object.isra.0+0x3a/0xa20 [ 837.591917] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 837.592564] kmem_cache_alloc+0x159/0x310 [ 837.593093] getname_flags.part.0+0x50/0x4f0 [ 837.593651] getname_flags+0x9a/0xe0 [ 837.594128] do_mkdirat+0x8f/0x2b0 [ 837.594588] ? user_path_create+0xf0/0xf0 [ 837.595136] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.595801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.596450] do_syscall_64+0x33/0x40 [ 837.596925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.597593] RIP: 0033:0x7f1dc49e2c27 [ 837.598069] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.600410] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.601373] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e2c27 [ 837.602432] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.603522] RBP: 00007f1dc1f59040 R08: 0000000000000000 R09: 0000000000388460 [ 837.604602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.605677] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 837.626826] FAULT_INJECTION: forcing a failure. [ 837.626826] name failslab, interval 1, probability 0, space 0, times 0 [ 837.627457] FAULT_INJECTION: forcing a failure. [ 837.627457] name failslab, interval 1, probability 0, space 0, times 0 [ 837.628288] CPU: 0 PID: 6024 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 837.628295] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.628299] Call Trace: [ 837.628314] dump_stack+0x107/0x167 [ 837.628336] should_fail.cold+0x5/0xa [ 837.634373] ? getname_flags.part.0+0x50/0x4f0 [ 837.634974] should_failslab+0x5/0x20 [ 837.635471] kmem_cache_alloc+0x5b/0x310 [ 837.636004] getname_flags.part.0+0x50/0x4f0 [ 837.636584] getname_flags+0x9a/0xe0 [ 837.637078] do_mkdirat+0x8f/0x2b0 [ 837.637526] ? user_path_create+0xf0/0xf0 [ 837.638074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.638760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.639436] do_syscall_64+0x33/0x40 [ 837.639937] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.640607] RIP: 0033:0x7ff6a2711c27 [ 837.641090] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.643476] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.644475] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a2711c27 [ 837.645410] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.646337] RBP: 00007ff69fc88040 R08: 0000000000000000 R09: 0000000000388460 [ 837.647313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.648386] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 837.649589] CPU: 1 PID: 6025 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 837.651452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 837.653664] Call Trace: [ 837.654359] dump_stack+0x107/0x167 [ 837.655281] should_fail.cold+0x5/0xa [ 837.656271] ? create_object.isra.0+0x3a/0xa20 [ 837.657441] should_failslab+0x5/0x20 [ 837.658433] kmem_cache_alloc+0x5b/0x310 [ 837.658849] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.659480] ? ksys_write+0x21a/0x260 [ 837.661608] create_object.isra.0+0x3a/0xa20 [ 837.661702] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.662730] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 837.662768] kmem_cache_alloc+0x159/0x310 [ 837.666098] getname_flags.part.0+0x50/0x4f0 [ 837.667136] getname_flags+0x9a/0xe0 [ 837.667911] do_mkdirat+0x8f/0x2b0 [ 837.668651] ? user_path_create+0xf0/0xf0 [ 837.669516] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 837.670726] ? syscall_enter_from_user_mode+0x1d/0x50 [ 837.671914] do_syscall_64+0x33/0x40 [ 837.672774] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 837.673992] RIP: 0033:0x7ff67ee7ac27 [ 837.674890] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 837.678403] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 837.679462] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.679494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7ac27 [ 837.684204] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 837.686003] RBP: 00007ff67c3f1040 R08: 0000000000000000 R09: 0000000000388460 [ 837.687821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 837.689624] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 837.695665] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:44:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) 15:44:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:44:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8004, 0x0, 0x0, 0x0, 0x0) 15:44:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) 15:44:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:44:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:44:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) 15:44:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) [ 852.791636] FAULT_INJECTION: forcing a failure. [ 852.791636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.794164] CPU: 0 PID: 6036 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 852.795611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.797354] Call Trace: [ 852.797919] dump_stack+0x107/0x167 [ 852.798171] FAULT_INJECTION: forcing a failure. [ 852.798171] name failslab, interval 1, probability 0, space 0, times 0 [ 852.798683] should_fail.cold+0x5/0xa [ 852.798719] strncpy_from_user+0x34/0x470 [ 852.803192] getname_flags.part.0+0x95/0x4f0 [ 852.804129] getname_flags+0x9a/0xe0 [ 852.804930] do_mkdirat+0x8f/0x2b0 [ 852.805681] ? user_path_create+0xf0/0xf0 [ 852.806560] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.807675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.808763] do_syscall_64+0x33/0x40 [ 852.809554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.810636] RIP: 0033:0x7ff67ee7ac27 [ 852.811441] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.815317] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 852.816923] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7ac27 [ 852.818416] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 852.819918] RBP: 00007ff67c3f1040 R08: 0000000000000000 R09: 0000000000388460 [ 852.821462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 852.822960] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 852.824460] CPU: 1 PID: 6045 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 852.825919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.827654] Call Trace: [ 852.828209] dump_stack+0x107/0x167 [ 852.828968] should_fail.cold+0x5/0xa [ 852.829765] ? create_object.isra.0+0x3a/0xa20 [ 852.830719] should_failslab+0x5/0x20 [ 852.831469] FAULT_INJECTION: forcing a failure. [ 852.831469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.831525] kmem_cache_alloc+0x5b/0x310 [ 852.834722] ? ksys_write+0x21a/0x260 [ 852.835535] create_object.isra.0+0x3a/0xa20 [ 852.836453] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 852.837504] kmem_cache_alloc+0x159/0x310 [ 852.838366] getname_flags.part.0+0x50/0x4f0 [ 852.839284] getname_flags+0x9a/0xe0 [ 852.840049] do_mkdirat+0x8f/0x2b0 [ 852.840788] ? user_path_create+0xf0/0xf0 [ 852.841657] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.842734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.843804] do_syscall_64+0x33/0x40 [ 852.844573] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.845657] RIP: 0033:0x7ff6a2711c27 [ 852.846426] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.850280] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 852.851944] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a2711c27 [ 852.853417] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 852.854893] RBP: 00007ff69fc88040 R08: 0000000000000000 R09: 0000000000388460 [ 852.856383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 852.857844] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 852.859348] CPU: 0 PID: 6041 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 852.860782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.862218] FAULT_INJECTION: forcing a failure. [ 852.862218] name failslab, interval 1, probability 0, space 0, times 0 [ 852.862491] Call Trace: [ 852.862516] dump_stack+0x107/0x167 [ 852.866109] should_fail.cold+0x5/0xa [ 852.866917] strncpy_from_user+0x34/0x470 [ 852.867780] getname_flags.part.0+0x95/0x4f0 [ 852.868693] getname_flags+0x9a/0xe0 [ 852.869486] do_mkdirat+0x8f/0x2b0 [ 852.870237] ? user_path_create+0xf0/0xf0 [ 852.871102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.872201] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.873282] do_syscall_64+0x33/0x40 [ 852.874052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.875140] RIP: 0033:0x7f1a21ab7c27 [ 852.875906] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.879767] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 852.881370] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21ab7c27 [ 852.882871] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 852.884370] RBP: 00007f1a1f02e040 R08: 0000000000000000 R09: 0000000000388460 [ 852.885870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 852.887366] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 852.888888] CPU: 1 PID: 6043 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 852.890340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.890657] FAULT_INJECTION: forcing a failure. [ 852.890657] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 852.892088] Call Trace: [ 852.892115] dump_stack+0x107/0x167 [ 852.892134] should_fail.cold+0x5/0xa [ 852.892159] ? getname_flags.part.0+0x50/0x4f0 [ 852.897513] should_failslab+0x5/0x20 [ 852.898304] kmem_cache_alloc+0x5b/0x310 [ 852.899176] getname_flags.part.0+0x50/0x4f0 [ 852.900106] getname_flags+0x9a/0xe0 [ 852.900879] do_mkdirat+0x8f/0x2b0 [ 852.901619] ? user_path_create+0xf0/0xf0 [ 852.902482] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.903592] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.904665] do_syscall_64+0x33/0x40 [ 852.905449] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.906508] RIP: 0033:0x7f7b7cfa7c27 [ 852.907296] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.911105] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 852.912727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfa7c27 [ 852.914211] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 852.915726] RBP: 00007f7b7a51e040 R08: 0000000000000000 R09: 0000000000388460 [ 852.917222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 852.918712] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 852.920222] CPU: 0 PID: 6044 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 852.921668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 852.923418] Call Trace: [ 852.923975] dump_stack+0x107/0x167 [ 852.924742] should_fail.cold+0x5/0xa [ 852.925561] strncpy_from_user+0x34/0x470 [ 852.926429] getname_flags.part.0+0x95/0x4f0 [ 852.927367] getname_flags+0x9a/0xe0 [ 852.928148] do_mkdirat+0x8f/0x2b0 [ 852.928888] ? user_path_create+0xf0/0xf0 [ 852.929749] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 852.930839] ? syscall_enter_from_user_mode+0x1d/0x50 [ 852.931932] do_syscall_64+0x33/0x40 [ 852.932714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 852.933772] RIP: 0033:0x7f1dc49e2c27 [ 852.934541] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 852.938380] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 852.940007] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e2c27 [ 852.941497] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 852.943099] RBP: 00007f1dc1f59040 R08: 0000000000000000 R09: 0000000000388460 [ 852.944669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 852.946114] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 852.952161] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 852.954565] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 852.957412] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 852.959311] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 852.961523] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 852.970666] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 852.973553] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:44:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8102, 0x0, 0x0, 0x0, 0x0) 15:44:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:44:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) 15:44:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) [ 853.097071] FAULT_INJECTION: forcing a failure. [ 853.097071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 853.099619] CPU: 1 PID: 6052 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 853.100877] FAULT_INJECTION: forcing a failure. [ 853.100877] name failslab, interval 1, probability 0, space 0, times 0 [ 853.101046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 853.101060] Call Trace: [ 853.105680] dump_stack+0x107/0x167 [ 853.106446] should_fail.cold+0x5/0xa [ 853.107291] strncpy_from_user+0x34/0x470 [ 853.108167] getname_flags.part.0+0x95/0x4f0 [ 853.109103] getname_flags+0x9a/0xe0 [ 853.109876] do_mkdirat+0x8f/0x2b0 [ 853.110621] ? user_path_create+0xf0/0xf0 [ 853.111507] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 853.112617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 853.113703] do_syscall_64+0x33/0x40 [ 853.114481] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 853.115557] RIP: 0033:0x7ff6a2711c27 [ 853.116348] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 853.120227] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 853.121825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a2711c27 [ 853.123366] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 853.124880] RBP: 00007ff69fc88040 R08: 0000000000000000 R09: 0000000000388460 [ 853.126378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 853.127871] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 853.129408] CPU: 0 PID: 6051 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 853.130854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 853.132600] Call Trace: [ 853.133152] dump_stack+0x107/0x167 [ 853.133914] should_fail.cold+0x5/0xa [ 853.134712] ? create_object.isra.0+0x3a/0xa20 [ 853.135688] should_failslab+0x5/0x20 [ 853.136496] kmem_cache_alloc+0x5b/0x310 [ 853.137356] ? ksys_write+0x21a/0x260 [ 853.138164] create_object.isra.0+0x3a/0xa20 [ 853.139096] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 853.140159] kmem_cache_alloc+0x159/0x310 [ 853.141030] getname_flags.part.0+0x50/0x4f0 [ 853.141950] getname_flags+0x9a/0xe0 [ 853.142729] do_mkdirat+0x8f/0x2b0 [ 853.143489] ? user_path_create+0xf0/0xf0 [ 853.144385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 853.145481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 853.146568] do_syscall_64+0x33/0x40 [ 853.147364] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 853.148448] RIP: 0033:0x7f7b7cfa7c27 [ 853.149234] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 853.153111] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 853.154689] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfa7c27 [ 853.156221] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 853.157722] RBP: 00007f7b7a51e040 R08: 0000000000000000 R09: 0000000000388460 [ 853.157939] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 853.159232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 853.159243] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 853.180832] FAULT_INJECTION: forcing a failure. [ 853.180832] name failslab, interval 1, probability 0, space 0, times 0 [ 853.183277] CPU: 0 PID: 6054 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 853.184705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 853.186439] Call Trace: [ 853.187004] dump_stack+0x107/0x167 [ 853.187765] should_fail.cold+0x5/0xa [ 853.188570] should_failslab+0x5/0x20 [ 853.189372] __kmalloc_track_caller+0x79/0x370 [ 853.190322] ? strndup_user+0x74/0xe0 [ 853.191125] ? getname_flags.part.0+0x1dd/0x4f0 [ 853.192111] memdup_user+0x22/0xd0 [ 853.192974] strndup_user+0x74/0xe0 [ 853.193867] __x64_sys_mount+0x133/0x300 [ 853.194778] ? copy_mnt_ns+0xa00/0xa00 [ 853.195639] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 853.196819] ? syscall_enter_from_user_mode+0x1d/0x50 [ 853.198018] do_syscall_64+0x33/0x40 [ 853.198932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 853.200077] RIP: 0033:0x7f1a21aba04a [ 853.200854] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 853.205233] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 853.206825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 853.208336] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 853.209852] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 853.211349] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 853.212827] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 853.273410] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:44:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) 15:44:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) 15:44:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:44:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:44:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) 15:44:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) 15:44:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf000, 0x0, 0x0, 0x0, 0x0) 15:44:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) [ 869.688502] FAULT_INJECTION: forcing a failure. [ 869.688502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 869.691078] CPU: 1 PID: 6066 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 869.691178] FAULT_INJECTION: forcing a failure. [ 869.691178] name failslab, interval 1, probability 0, space 0, times 0 [ 869.692545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.692553] Call Trace: [ 869.692583] dump_stack+0x107/0x167 [ 869.692611] should_fail.cold+0x5/0xa [ 869.700182] strncpy_from_user+0x34/0x470 [ 869.701246] getname_flags.part.0+0x95/0x4f0 [ 869.702230] getname_flags+0x9a/0xe0 [ 869.703181] do_mkdirat+0x8f/0x2b0 [ 869.703945] ? user_path_create+0xf0/0xf0 [ 869.705023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 869.706137] ? syscall_enter_from_user_mode+0x1d/0x50 [ 869.707229] do_syscall_64+0x33/0x40 [ 869.708065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 869.709263] RIP: 0033:0x7f7b7cfa7c27 [ 869.710133] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.714405] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 869.716186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfa7c27 [ 869.717845] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 869.719514] RBP: 00007f7b7a51e040 R08: 0000000000000000 R09: 0000000000388460 [ 869.721175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 869.722831] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 869.724533] CPU: 0 PID: 6073 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 869.726019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.727845] Call Trace: [ 869.728568] dump_stack+0x107/0x167 [ 869.729565] should_fail.cold+0x5/0xa [ 869.729965] FAULT_INJECTION: forcing a failure. [ 869.729965] name failslab, interval 1, probability 0, space 0, times 0 [ 869.730563] should_failslab+0x5/0x20 [ 869.730589] __kmalloc_track_caller+0x79/0x370 [ 869.730616] ? strndup_user+0x74/0xe0 [ 869.736319] ? getname_flags.part.0+0x1dd/0x4f0 [ 869.737393] memdup_user+0x22/0xd0 [ 869.738171] strndup_user+0x74/0xe0 [ 869.738949] __x64_sys_mount+0x133/0x300 [ 869.739848] ? copy_mnt_ns+0xa00/0xa00 [ 869.740701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 869.741840] ? syscall_enter_from_user_mode+0x1d/0x50 [ 869.742964] do_syscall_64+0x33/0x40 [ 869.743798] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 869.744905] RIP: 0033:0x7ff6a271404a [ 869.745711] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.749715] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 869.751388] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 869.752950] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 869.754498] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 869.756077] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 869.757621] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 869.759202] CPU: 1 PID: 6068 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 869.759454] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 869.760798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.760807] Call Trace: [ 869.760830] dump_stack+0x107/0x167 [ 869.760851] should_fail.cold+0x5/0xa [ 869.760880] should_failslab+0x5/0x20 [ 869.768015] __kmalloc_track_caller+0x79/0x370 [ 869.769071] ? strndup_user+0x74/0xe0 [ 869.769951] ? getname_flags.part.0+0x1dd/0x4f0 [ 869.771034] memdup_user+0x22/0xd0 [ 869.771866] strndup_user+0x74/0xe0 [ 869.772712] __x64_sys_mount+0x133/0x300 [ 869.773651] ? copy_mnt_ns+0xa00/0xa00 [ 869.774557] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 869.775778] ? syscall_enter_from_user_mode+0x1d/0x50 [ 869.776975] do_syscall_64+0x33/0x40 [ 869.777838] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 869.779021] RIP: 0033:0x7ff67ee7d04a [ 869.779892] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.784124] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 869.785880] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 869.786222] FAULT_INJECTION: forcing a failure. [ 869.786222] name failslab, interval 1, probability 0, space 0, times 0 [ 869.787534] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 869.787547] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 869.787559] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 869.787570] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 869.796406] CPU: 0 PID: 6079 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 869.797896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.799709] Call Trace: [ 869.800286] dump_stack+0x107/0x167 [ 869.801081] should_fail.cold+0x5/0xa [ 869.801905] ? create_object.isra.0+0x3a/0xa20 [ 869.802921] should_failslab+0x5/0x20 [ 869.803777] kmem_cache_alloc+0x5b/0x310 [ 869.804671] create_object.isra.0+0x3a/0xa20 [ 869.805636] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 869.806749] __kmalloc_track_caller+0x177/0x370 [ 869.807790] ? strndup_user+0x74/0xe0 [ 869.808627] ? getname_flags.part.0+0x1dd/0x4f0 [ 869.809647] memdup_user+0x22/0xd0 [ 869.810425] strndup_user+0x74/0xe0 [ 869.811227] __x64_sys_mount+0x133/0x300 [ 869.812125] ? copy_mnt_ns+0xa00/0xa00 [ 869.812962] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 869.814107] ? syscall_enter_from_user_mode+0x1d/0x50 [ 869.815246] do_syscall_64+0x33/0x40 [ 869.816083] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 869.817218] RIP: 0033:0x7f1a21aba04a [ 869.818030] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.822044] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 869.823662] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 869.825187] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 869.826724] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 869.828297] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 869.829842] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 869.840684] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue [ 869.843286] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 869.844501] FAULT_INJECTION: forcing a failure. [ 869.844501] name failslab, interval 1, probability 0, space 0, times 0 [ 869.847657] CPU: 0 PID: 6078 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 869.849159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 869.850963] Call Trace: [ 869.851570] dump_stack+0x107/0x167 [ 869.852381] should_fail.cold+0x5/0xa [ 869.853236] should_failslab+0x5/0x20 [ 869.854075] __kmalloc_track_caller+0x79/0x370 [ 869.855079] ? strndup_user+0x74/0xe0 [ 869.855919] ? getname_flags.part.0+0x1dd/0x4f0 [ 869.856943] memdup_user+0x22/0xd0 [ 869.857725] strndup_user+0x74/0xe0 [ 869.858525] __x64_sys_mount+0x133/0x300 [ 869.859413] ? copy_mnt_ns+0xa00/0xa00 [ 869.860299] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 869.861448] ? syscall_enter_from_user_mode+0x1d/0x50 [ 869.862586] do_syscall_64+0x33/0x40 [ 869.863407] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 869.864540] RIP: 0033:0x7f1dc49e504a [ 869.865368] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 869.869427] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 869.871272] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 869.872845] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 869.874431] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 869.876027] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 869.877587] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:44:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:44:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xff01, 0x0, 0x0, 0x0, 0x0) 15:44:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:44:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) 15:44:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:44:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, 0x0) 15:44:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}]}) [ 869.961215] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 870.005256] FAULT_INJECTION: forcing a failure. [ 870.005256] name failslab, interval 1, probability 0, space 0, times 0 [ 870.007877] CPU: 0 PID: 6083 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 870.009385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.011210] Call Trace: [ 870.011799] dump_stack+0x107/0x167 [ 870.012601] should_fail.cold+0x5/0xa [ 870.013443] ? create_object.isra.0+0x3a/0xa20 [ 870.014460] should_failslab+0x5/0x20 [ 870.015297] kmem_cache_alloc+0x5b/0x310 [ 870.016209] create_object.isra.0+0x3a/0xa20 [ 870.017176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 870.018308] __kmalloc_track_caller+0x177/0x370 [ 870.019330] ? strndup_user+0x74/0xe0 [ 870.020181] ? getname_flags.part.0+0x1dd/0x4f0 [ 870.021203] memdup_user+0x22/0xd0 [ 870.021974] strndup_user+0x74/0xe0 [ 870.022778] __x64_sys_mount+0x133/0x300 [ 870.023691] ? copy_mnt_ns+0xa00/0xa00 [ 870.024556] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 870.025708] ? syscall_enter_from_user_mode+0x1d/0x50 [ 870.026832] do_syscall_64+0x33/0x40 [ 870.027652] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.028740] RIP: 0033:0x7ff6a271404a [ 870.029537] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.033596] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.034631] FAULT_INJECTION: forcing a failure. [ 870.034631] name failslab, interval 1, probability 0, space 0, times 0 [ 870.035334] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 870.035350] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 870.035366] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 870.035392] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 870.044710] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 870.046327] CPU: 1 PID: 6089 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 870.047922] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.049824] Call Trace: [ 870.050435] dump_stack+0x107/0x167 [ 870.051273] should_fail.cold+0x5/0xa [ 870.052168] should_failslab+0x5/0x20 [ 870.053045] __kmalloc_track_caller+0x79/0x370 [ 870.054090] ? strndup_user+0x74/0xe0 [ 870.054967] ? getname_flags.part.0+0x1dd/0x4f0 [ 870.056044] memdup_user+0x22/0xd0 [ 870.056859] strndup_user+0x74/0xe0 [ 870.057695] __x64_sys_mount+0x133/0x300 [ 870.058625] ? copy_mnt_ns+0xa00/0xa00 [ 870.059618] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 870.060853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 870.062040] do_syscall_64+0x33/0x40 [ 870.062897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.064080] RIP: 0033:0x7f7b7cfaa04a [ 870.064935] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.069163] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.070907] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 870.072549] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 870.074183] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 870.075819] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 870.077450] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 15:44:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:44:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) [ 870.089412] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue [ 870.097921] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,,errors=continue 15:44:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000, 0x0, 0x0, 0x0, 0x0) [ 870.103503] FAULT_INJECTION: forcing a failure. [ 870.103503] name failslab, interval 1, probability 0, space 0, times 0 [ 870.106115] CPU: 1 PID: 6093 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 870.107687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.109585] Call Trace: [ 870.110197] dump_stack+0x107/0x167 [ 870.111040] should_fail.cold+0x5/0xa [ 870.111927] ? create_object.isra.0+0x3a/0xa20 [ 870.112977] should_failslab+0x5/0x20 [ 870.113853] kmem_cache_alloc+0x5b/0x310 [ 870.114792] create_object.isra.0+0x3a/0xa20 [ 870.115809] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 870.116983] __kmalloc_track_caller+0x177/0x370 [ 870.118045] ? strndup_user+0x74/0xe0 [ 870.118917] ? getname_flags.part.0+0x1dd/0x4f0 [ 870.119994] memdup_user+0x22/0xd0 [ 870.120811] strndup_user+0x74/0xe0 [ 870.121648] __x64_sys_mount+0x133/0x300 [ 870.122579] ? copy_mnt_ns+0xa00/0xa00 [ 870.123489] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 870.124698] ? syscall_enter_from_user_mode+0x1d/0x50 [ 870.125887] do_syscall_64+0x33/0x40 [ 870.126744] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.127928] RIP: 0033:0x7ff67ee7d04a [ 870.128782] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.133015] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.134764] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 870.136419] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 870.138063] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 870.139714] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 870.141283] FAULT_INJECTION: forcing a failure. [ 870.141283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 870.141355] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 870.146127] CPU: 0 PID: 6095 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 870.147646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.149483] Call Trace: [ 870.150069] dump_stack+0x107/0x167 [ 870.150859] should_fail.cold+0x5/0xa [ 870.151711] _copy_from_user+0x2e/0x1b0 [ 870.152565] memdup_user+0x65/0xd0 [ 870.153334] strndup_user+0x74/0xe0 [ 870.154112] __x64_sys_mount+0x133/0x300 [ 870.154964] ? copy_mnt_ns+0xa00/0xa00 [ 870.155817] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 870.156939] ? syscall_enter_from_user_mode+0x1d/0x50 [ 870.158065] do_syscall_64+0x33/0x40 [ 870.158872] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.159998] RIP: 0033:0x7f1a21aba04a [ 870.160797] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.164739] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.165010] FAULT_INJECTION: forcing a failure. [ 870.165010] name failslab, interval 1, probability 0, space 0, times 0 [ 870.166356] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 870.166367] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 870.166377] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 870.166388] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 870.166407] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 870.176248] CPU: 1 PID: 6097 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 870.177640] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 870.179311] Call Trace: [ 870.179860] dump_stack+0x107/0x167 [ 870.180604] should_fail.cold+0x5/0xa [ 870.181376] ? create_object.isra.0+0x3a/0xa20 [ 870.182304] should_failslab+0x5/0x20 [ 870.183075] kmem_cache_alloc+0x5b/0x310 [ 870.183922] create_object.isra.0+0x3a/0xa20 [ 870.184822] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 870.185850] __kmalloc_track_caller+0x177/0x370 [ 870.186796] ? strndup_user+0x74/0xe0 [ 870.187580] ? getname_flags.part.0+0x1dd/0x4f0 [ 870.188551] memdup_user+0x22/0xd0 [ 870.189268] strndup_user+0x74/0xe0 [ 870.190006] __x64_sys_mount+0x133/0x300 [ 870.190832] ? copy_mnt_ns+0xa00/0xa00 [ 870.191624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 870.192697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 870.193743] do_syscall_64+0x33/0x40 [ 870.194499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 870.195542] RIP: 0033:0x7f1dc49e504a [ 870.196299] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 870.200043] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 870.201592] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 870.203044] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 870.204510] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 870.205955] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 870.207415] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:44:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) 15:44:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@nobarrier}, {@stripe}]}) 15:44:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, 0x0) [ 870.244245] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 870.260320] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,nobarrier,stripe=0x0000000000000000,,errors=continue [ 870.262961] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 870.283017] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:00 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:45:00 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:45:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@noblock_validity}, {@stripe}]}) 15:45:00 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:45:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) 15:45:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:45:00 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:45:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ff1f, 0x0, 0x0, 0x0, 0x0) [ 885.098099] FAULT_INJECTION: forcing a failure. [ 885.098099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.098382] EXT4-fs: 1 callbacks suppressed [ 885.098397] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,noblock_validity,stripe=0x0000000000000000,,errors=continue [ 885.101090] CPU: 1 PID: 6118 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 885.102479] FAULT_INJECTION: forcing a failure. [ 885.102479] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.104731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.104738] Call Trace: [ 885.104763] dump_stack+0x107/0x167 [ 885.104784] should_fail.cold+0x5/0xa [ 885.104818] _copy_from_user+0x2e/0x1b0 [ 885.114191] memdup_user+0x65/0xd0 [ 885.115028] strndup_user+0x74/0xe0 [ 885.115886] __x64_sys_mount+0x133/0x300 [ 885.116853] ? copy_mnt_ns+0xa00/0xa00 [ 885.117883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 885.119138] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.120377] do_syscall_64+0x33/0x40 [ 885.121260] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.122471] RIP: 0033:0x7f1dc49e504a [ 885.123350] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.127615] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 885.129423] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 885.131105] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 885.132816] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 885.134512] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 885.136228] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 885.137960] CPU: 0 PID: 6120 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 885.139440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.141227] Call Trace: [ 885.141799] dump_stack+0x107/0x167 [ 885.142580] should_fail.cold+0x5/0xa [ 885.143401] _copy_from_user+0x2e/0x1b0 [ 885.144263] memdup_user+0x65/0xd0 [ 885.145025] strndup_user+0x74/0xe0 [ 885.145808] __x64_sys_mount+0x133/0x300 [ 885.146616] FAULT_INJECTION: forcing a failure. [ 885.146616] name failslab, interval 1, probability 0, space 0, times 0 [ 885.146686] ? copy_mnt_ns+0xa00/0xa00 [ 885.150178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 885.151306] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.152419] do_syscall_64+0x33/0x40 [ 885.153219] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.154318] RIP: 0033:0x7ff6a271404a [ 885.155115] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.159065] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 885.160711] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 885.162240] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 885.163766] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 885.165304] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 885.166833] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 885.169382] CPU: 1 PID: 6116 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 885.170032] FAULT_INJECTION: forcing a failure. [ 885.170032] name failslab, interval 1, probability 0, space 0, times 0 [ 885.170856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.170863] Call Trace: [ 885.170895] dump_stack+0x107/0x167 [ 885.176380] should_fail.cold+0x5/0xa [ 885.177216] ? create_object.isra.0+0x3a/0xa20 [ 885.178212] should_failslab+0x5/0x20 [ 885.179042] kmem_cache_alloc+0x5b/0x310 [ 885.179935] create_object.isra.0+0x3a/0xa20 [ 885.180906] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 885.182010] __kmalloc_track_caller+0x177/0x370 [ 885.183022] ? strndup_user+0x74/0xe0 [ 885.183847] ? getname_flags.part.0+0x1dd/0x4f0 [ 885.184865] memdup_user+0x22/0xd0 [ 885.185638] strndup_user+0x74/0xe0 [ 885.186434] __x64_sys_mount+0x133/0x300 [ 885.187317] ? copy_mnt_ns+0xa00/0xa00 [ 885.188188] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 885.189327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.190455] do_syscall_64+0x33/0x40 [ 885.191261] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.192379] RIP: 0033:0x7f7b7cfaa04a [ 885.193190] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.197162] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 885.198811] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 885.200359] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 885.201901] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 885.203444] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 885.204993] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 885.206569] CPU: 0 PID: 6126 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 885.208046] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.209819] Call Trace: [ 885.210388] dump_stack+0x107/0x167 [ 885.211173] should_fail.cold+0x5/0xa [ 885.211670] FAULT_INJECTION: forcing a failure. [ 885.211670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 885.212001] ? copy_mount_options+0x55/0x180 [ 885.212023] should_failslab+0x5/0x20 [ 885.212053] kmem_cache_alloc_trace+0x55/0x320 [ 885.217175] ? _copy_from_user+0xfb/0x1b0 [ 885.218067] copy_mount_options+0x55/0x180 [ 885.218978] __x64_sys_mount+0x1a8/0x300 [ 885.219846] ? copy_mnt_ns+0xa00/0xa00 [ 885.220699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 885.221822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.222928] do_syscall_64+0x33/0x40 [ 885.223727] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.224836] RIP: 0033:0x7f1a21aba04a [ 885.225604] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.229550] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 885.231180] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 885.232715] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 885.234243] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 885.235767] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 885.237303] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 885.238862] CPU: 1 PID: 6128 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 885.240360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 885.242134] Call Trace: [ 885.242717] dump_stack+0x107/0x167 [ 885.243499] should_fail.cold+0x5/0xa [ 885.244341] _copy_from_user+0x2e/0x1b0 [ 885.245205] memdup_user+0x65/0xd0 [ 885.245972] strndup_user+0x74/0xe0 [ 885.246762] __x64_sys_mount+0x133/0x300 [ 885.247643] ? copy_mnt_ns+0xa00/0xa00 [ 885.248506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 885.249646] ? syscall_enter_from_user_mode+0x1d/0x50 [ 885.250761] do_syscall_64+0x33/0x40 [ 885.251571] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 885.252682] RIP: 0033:0x7ff67ee7d04a [ 885.253488] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 885.257457] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 885.259097] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 885.260642] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 885.262210] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 15:45:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ffff, 0x0, 0x0, 0x0, 0x0) [ 885.263799] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 885.265407] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 885.273254] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue [ 885.275651] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@usrjquota}, {@stripe}]}) [ 885.367752] EXT4-fs (sda): re-mounted. Opts: debug,usrjquota=,stripe=0x0000000000000000,,errors=continue 15:45:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:45:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@debug}, {@stripe}]}) 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 15:45:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:45:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:45:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:45:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) [ 897.455917] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue [ 897.460681] FAULT_INJECTION: forcing a failure. [ 897.460681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.463132] CPU: 0 PID: 6146 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 897.464561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.466264] Call Trace: [ 897.466811] dump_stack+0x107/0x167 [ 897.467568] should_fail.cold+0x5/0xa [ 897.468362] _copy_from_user+0x2e/0x1b0 [ 897.469204] memdup_user+0x65/0xd0 [ 897.469944] strndup_user+0x74/0xe0 [ 897.470707] __x64_sys_mount+0x133/0x300 [ 897.471553] ? copy_mnt_ns+0xa00/0xa00 [ 897.472385] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.473478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.474132] FAULT_INJECTION: forcing a failure. [ 897.474132] name failslab, interval 1, probability 0, space 0, times 0 [ 897.474556] do_syscall_64+0x33/0x40 [ 897.477706] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.478763] RIP: 0033:0x7f7b7cfaa04a [ 897.479527] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.483380] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.484966] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 897.486441] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.487915] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 897.489401] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.490871] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 897.492357] CPU: 1 PID: 6151 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 897.493766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.495432] Call Trace: [ 897.495972] dump_stack+0x107/0x167 [ 897.496099] EXT4-fs (sda): re-mounted. Opts: debug,stripe=0x0000000000000000,,errors=continue [ 897.496751] should_fail.cold+0x5/0xa 15:45:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) [ 897.499275] ? copy_mount_options+0x55/0x180 [ 897.500312] should_failslab+0x5/0x20 [ 897.501134] kmem_cache_alloc_trace+0x55/0x320 [ 897.502047] ? _copy_from_user+0xfb/0x1b0 [ 897.502907] copy_mount_options+0x55/0x180 [ 897.503762] __x64_sys_mount+0x1a8/0x300 [ 897.504598] ? copy_mnt_ns+0xa00/0xa00 [ 897.505397] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.506243] FAULT_INJECTION: forcing a failure. [ 897.506243] name failslab, interval 1, probability 0, space 0, times 0 [ 897.506473] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.509803] do_syscall_64+0x33/0x40 [ 897.510561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.511631] RIP: 0033:0x7ff6a271404a [ 897.512387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.516248] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.517918] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 897.519490] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.521057] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 897.522633] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.524172] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 897.525775] CPU: 0 PID: 6147 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 897.527155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.528828] Call Trace: [ 897.529360] dump_stack+0x107/0x167 [ 897.530098] should_fail.cold+0x5/0xa [ 897.530873] ? copy_mount_options+0x55/0x180 [ 897.531767] should_failslab+0x5/0x20 [ 897.532548] kmem_cache_alloc_trace+0x55/0x320 [ 897.533478] ? _copy_from_user+0xfb/0x1b0 [ 897.534328] copy_mount_options+0x55/0x180 [ 897.535192] __x64_sys_mount+0x1a8/0x300 [ 897.536018] ? copy_mnt_ns+0xa00/0xa00 [ 897.536825] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.537893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.538951] do_syscall_64+0x33/0x40 [ 897.539712] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.540764] RIP: 0033:0x7ff67ee7d04a [ 897.541516] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.545235] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.546767] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 897.548209] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.549657] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 897.551089] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.552533] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 897.558941] FAULT_INJECTION: forcing a failure. [ 897.558941] name failslab, interval 1, probability 0, space 0, times 0 [ 897.561277] CPU: 0 PID: 6149 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 897.562642] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.564306] Call Trace: [ 897.564848] dump_stack+0x107/0x167 [ 897.565576] should_fail.cold+0x5/0xa [ 897.566342] ? create_object.isra.0+0x3a/0xa20 [ 897.567260] should_failslab+0x5/0x20 [ 897.568028] kmem_cache_alloc+0x5b/0x310 [ 897.568852] create_object.isra.0+0x3a/0xa20 [ 897.569736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 897.570765] kmem_cache_alloc_trace+0x151/0x320 [ 897.571712] copy_mount_options+0x55/0x180 [ 897.572591] __x64_sys_mount+0x1a8/0x300 [ 897.573407] ? copy_mnt_ns+0xa00/0xa00 [ 897.574209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.575266] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.576305] do_syscall_64+0x33/0x40 [ 897.577065] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.578091] RIP: 0033:0x7f1a21aba04a [ 897.578842] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.582496] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.584001] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 897.585414] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.586832] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 897.588291] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.589721] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 897.606719] FAULT_INJECTION: forcing a failure. [ 897.606719] name failslab, interval 1, probability 0, space 0, times 0 [ 897.609683] CPU: 1 PID: 6153 Comm: syz-executor.5 Not tainted 5.10.233 #1 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1010000, 0x0, 0x0, 0x0, 0x0) [ 897.611434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.613758] Call Trace: [ 897.614348] dump_stack+0x107/0x167 [ 897.615166] should_fail.cold+0x5/0xa [ 897.616000] ? copy_mount_options+0x55/0x180 [ 897.616983] should_failslab+0x5/0x20 [ 897.617842] kmem_cache_alloc_trace+0x55/0x320 [ 897.618823] ? _copy_from_user+0xfb/0x1b0 [ 897.619729] copy_mount_options+0x55/0x180 [ 897.620812] __x64_sys_mount+0x1a8/0x300 [ 897.621679] ? copy_mnt_ns+0xa00/0xa00 [ 897.622678] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.623794] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.625118] do_syscall_64+0x33/0x40 [ 897.625941] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.627256] RIP: 0033:0x7f1dc49e504a [ 897.628050] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.632757] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.634377] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 897.635930] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.637517] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 897.639112] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.640721] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:45:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:45:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 897.674579] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 15:45:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:45:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) [ 897.704594] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 897.736066] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 897.768351] FAULT_INJECTION: forcing a failure. [ 897.768351] name failslab, interval 1, probability 0, space 0, times 0 [ 897.770715] CPU: 1 PID: 6164 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 897.772104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.773811] Call Trace: [ 897.774359] dump_stack+0x107/0x167 [ 897.775115] should_fail.cold+0x5/0xa [ 897.775899] ? copy_mount_options+0x55/0x180 [ 897.776813] should_failslab+0x5/0x20 [ 897.777598] kmem_cache_alloc_trace+0x55/0x320 [ 897.778529] ? _copy_from_user+0xfb/0x1b0 [ 897.779394] copy_mount_options+0x55/0x180 [ 897.780271] __x64_sys_mount+0x1a8/0x300 [ 897.781141] ? copy_mnt_ns+0xa00/0xa00 [ 897.781961] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.783026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.784099] do_syscall_64+0x33/0x40 [ 897.784879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.785942] RIP: 0033:0x7f7b7cfaa04a [ 897.786711] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.790454] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.792017] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 897.793486] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.794959] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 897.796422] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.797879] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 15:45:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) [ 897.807512] FAULT_INJECTION: forcing a failure. [ 897.807512] name failslab, interval 1, probability 0, space 0, times 0 [ 897.809621] CPU: 0 PID: 6165 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 897.810812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.812253] Call Trace: [ 897.812726] dump_stack+0x107/0x167 [ 897.813377] should_fail.cold+0x5/0xa [ 897.814064] ? create_object.isra.0+0x3a/0xa20 [ 897.814899] should_failslab+0x5/0x20 [ 897.815574] kmem_cache_alloc+0x5b/0x310 [ 897.816286] create_object.isra.0+0x3a/0xa20 [ 897.817060] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 897.817952] kmem_cache_alloc_trace+0x151/0x320 [ 897.818771] copy_mount_options+0x55/0x180 [ 897.819510] __x64_sys_mount+0x1a8/0x300 [ 897.820220] ? copy_mnt_ns+0xa00/0xa00 [ 897.820923] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.821846] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.822749] do_syscall_64+0x33/0x40 [ 897.823405] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.824307] RIP: 0033:0x7ff6a271404a [ 897.824971] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.828176] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.829504] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 897.829629] FAULT_INJECTION: forcing a failure. [ 897.829629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 897.830739] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.830749] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 897.830758] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.830767] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 897.840132] CPU: 1 PID: 6169 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 897.841575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.843665] Call Trace: [ 897.844216] dump_stack+0x107/0x167 [ 897.845183] should_fail.cold+0x5/0xa [ 897.845982] _copy_from_user+0x2e/0x1b0 [ 897.846812] copy_mount_options+0x76/0x180 [ 897.847821] __x64_sys_mount+0x1a8/0x300 [ 897.848768] ? copy_mnt_ns+0xa00/0xa00 [ 897.849631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.850961] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.852214] do_syscall_64+0x33/0x40 [ 897.853166] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.854348] RIP: 0033:0x7f1a21aba04a [ 897.855333] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.859492] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.861486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 897.863226] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.864723] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 897.866208] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.867804] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 15:45:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) 15:45:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) [ 897.894427] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 897.904456] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3300000, 0x0, 0x0, 0x0, 0x0) 15:45:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) [ 897.946585] FAULT_INJECTION: forcing a failure. [ 897.946585] name failslab, interval 1, probability 0, space 0, times 0 [ 897.949182] CPU: 1 PID: 6173 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 897.950586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.952365] Call Trace: [ 897.952921] dump_stack+0x107/0x167 [ 897.953659] should_fail.cold+0x5/0xa [ 897.954445] ? create_object.isra.0+0x3a/0xa20 [ 897.955362] should_failslab+0x5/0x20 [ 897.956148] kmem_cache_alloc+0x5b/0x310 [ 897.956989] create_object.isra.0+0x3a/0xa20 [ 897.957876] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 897.958898] kmem_cache_alloc_trace+0x151/0x320 [ 897.959846] copy_mount_options+0x55/0x180 [ 897.960714] __x64_sys_mount+0x1a8/0x300 [ 897.961543] ? copy_mnt_ns+0xa00/0xa00 [ 897.962356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.963427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.964479] do_syscall_64+0x33/0x40 [ 897.965236] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.966224] FAULT_INJECTION: forcing a failure. [ 897.966224] name failslab, interval 1, probability 0, space 0, times 0 [ 897.966279] RIP: 0033:0x7f1dc49e504a [ 897.966308] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.972880] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 897.974558] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 897.976128] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 897.977737] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 897.979318] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 897.980950] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 897.982551] CPU: 0 PID: 6178 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 897.983626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 897.984927] Call Trace: [ 897.985341] dump_stack+0x107/0x167 [ 897.985913] should_fail.cold+0x5/0xa [ 897.986510] ? getname_flags.part.0+0x50/0x4f0 [ 897.987221] should_failslab+0x5/0x20 [ 897.987824] kmem_cache_alloc+0x5b/0x310 [ 897.988477] getname_flags.part.0+0x50/0x4f0 [ 897.989165] getname_flags+0x9a/0xe0 [ 897.989416] FAULT_INJECTION: forcing a failure. [ 897.989416] name failslab, interval 1, probability 0, space 0, times 0 [ 897.989750] do_mkdirat+0x8f/0x2b0 [ 897.992522] ? user_path_create+0xf0/0xf0 [ 897.993175] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 897.993992] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.994793] do_syscall_64+0x33/0x40 [ 897.995372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 897.996186] RIP: 0033:0x7fb22fefec27 [ 897.996776] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.999595] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 898.000777] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22fefec27 [ 898.001870] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 898.002952] RBP: 00007fb22d475040 R08: 0000000000000000 R09: 0000000000388460 [ 898.004035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 898.005125] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 898.006240] CPU: 1 PID: 6175 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 898.007680] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.009366] Call Trace: [ 898.009897] dump_stack+0x107/0x167 [ 898.010636] should_fail.cold+0x5/0xa [ 898.011409] ? create_object.isra.0+0x3a/0xa20 [ 898.012347] should_failslab+0x5/0x20 [ 898.013146] kmem_cache_alloc+0x5b/0x310 [ 898.014001] create_object.isra.0+0x3a/0xa20 [ 898.014894] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 898.015930] kmem_cache_alloc_trace+0x151/0x320 [ 898.016877] ? _copy_from_user+0xfb/0x1b0 [ 898.017732] copy_mount_options+0x55/0x180 [ 898.018593] __x64_sys_mount+0x1a8/0x300 [ 898.019418] ? copy_mnt_ns+0xa00/0xa00 [ 898.020221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 898.021309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 898.022363] do_syscall_64+0x33/0x40 [ 898.023125] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.024166] RIP: 0033:0x7ff67ee7d04a [ 898.024926] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.028651] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.030222] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 898.031700] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 898.033180] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 15:45:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) [ 898.034642] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 898.036254] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 898.064753] FAULT_INJECTION: forcing a failure. [ 898.064753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 898.067434] CPU: 1 PID: 6183 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 898.068970] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.070741] Call Trace: [ 898.071550] dump_stack+0x107/0x167 [ 898.072488] should_fail.cold+0x5/0xa [ 898.073335] _copy_from_user+0x2e/0x1b0 [ 898.074245] copy_mount_options+0x76/0x180 [ 898.075181] __x64_sys_mount+0x1a8/0x300 [ 898.076115] ? copy_mnt_ns+0xa00/0xa00 [ 898.077073] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 898.078186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 898.079501] do_syscall_64+0x33/0x40 [ 898.080354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.081640] RIP: 0033:0x7ff6a271404a 15:45:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 15:45:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) [ 898.082447] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.087350] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.089297] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 898.090842] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 898.092599] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 898.094092] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 898.095915] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 898.096845] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 898.103481] FAULT_INJECTION: forcing a failure. [ 898.103481] name failslab, interval 1, probability 0, space 0, times 0 [ 898.105823] CPU: 1 PID: 6184 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 898.107200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 898.108887] Call Trace: [ 898.109427] dump_stack+0x107/0x167 [ 898.110176] should_fail.cold+0x5/0xa [ 898.110960] ? getname_flags.part.0+0x50/0x4f0 [ 898.111906] should_failslab+0x5/0x20 [ 898.112773] kmem_cache_alloc+0x5b/0x310 [ 898.113659] getname_flags.part.0+0x50/0x4f0 [ 898.114607] user_path_at_empty+0xa1/0x100 [ 898.115701] __x64_sys_mount+0x1e9/0x300 [ 898.116568] ? copy_mnt_ns+0xa00/0xa00 [ 898.117566] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 898.118788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 898.120086] do_syscall_64+0x33/0x40 [ 898.120918] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 898.122218] RIP: 0033:0x7f1a21aba04a [ 898.123053] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 898.127759] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 898.129422] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 898.130879] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 898.132337] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 898.133837] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 898.135662] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 898.137077] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 898.139081] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) 15:45:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) 15:45:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) [ 909.355617] FAULT_INJECTION: forcing a failure. [ 909.355617] name failslab, interval 1, probability 0, space 0, times 0 [ 909.355969] FAULT_INJECTION: forcing a failure. [ 909.355969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.356923] CPU: 0 PID: 6196 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 909.356929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.356932] Call Trace: [ 909.356948] dump_stack+0x107/0x167 [ 909.356970] should_fail.cold+0x5/0xa [ 909.362727] ? create_object.isra.0+0x3a/0xa20 [ 909.363249] should_failslab+0x5/0x20 [ 909.363685] kmem_cache_alloc+0x5b/0x310 [ 909.364144] ? ksys_write+0x21a/0x260 [ 909.364579] create_object.isra.0+0x3a/0xa20 [ 909.365086] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.365661] kmem_cache_alloc+0x159/0x310 [ 909.366136] getname_flags.part.0+0x50/0x4f0 [ 909.366640] getname_flags+0x9a/0xe0 [ 909.367063] do_mkdirat+0x8f/0x2b0 [ 909.367469] ? user_path_create+0xf0/0xf0 [ 909.367944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.368542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.369142] do_syscall_64+0x33/0x40 [ 909.369566] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.370147] RIP: 0033:0x7fb22fefec27 [ 909.370571] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.372656] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 909.373531] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22fefec27 [ 909.374341] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 909.375151] RBP: 00007fb22d475040 R08: 0000000000000000 R09: 0000000000388460 [ 909.375960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 909.376772] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 909.377612] CPU: 1 PID: 6195 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 909.378327] FAULT_INJECTION: forcing a failure. [ 909.378327] name failslab, interval 1, probability 0, space 0, times 0 [ 909.379363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.379369] Call Trace: [ 909.379400] dump_stack+0x107/0x167 [ 909.384323] should_fail.cold+0x5/0xa [ 909.385310] _copy_from_user+0x2e/0x1b0 [ 909.386326] copy_mount_options+0x76/0x180 [ 909.387405] __x64_sys_mount+0x1a8/0x300 [ 909.388434] ? copy_mnt_ns+0xa00/0xa00 [ 909.389438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.390768] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.392086] do_syscall_64+0x33/0x40 [ 909.393038] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.394345] RIP: 0033:0x7ff67ee7d04a [ 909.395292] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.399978] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.401920] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 909.403736] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.405561] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 909.407380] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.409213] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 909.411043] CPU: 0 PID: 6191 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 909.411826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.412763] Call Trace: [ 909.413069] dump_stack+0x107/0x167 [ 909.413481] should_fail.cold+0x5/0xa [ 909.413910] ? create_object.isra.0+0x3a/0xa20 [ 909.414427] should_failslab+0x5/0x20 [ 909.414859] kmem_cache_alloc+0x5b/0x310 [ 909.415317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.415912] create_object.isra.0+0x3a/0xa20 [ 909.416408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.416991] kmem_cache_alloc+0x159/0x310 [ 909.417463] getname_flags.part.0+0x50/0x4f0 [ 909.417964] user_path_at_empty+0xa1/0x100 [ 909.418444] __x64_sys_mount+0x1e9/0x300 [ 909.418909] ? copy_mnt_ns+0xa00/0xa00 [ 909.419304] FAULT_INJECTION: forcing a failure. [ 909.419304] name failslab, interval 1, probability 0, space 0, times 0 [ 909.419359] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.422391] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.422972] do_syscall_64+0x33/0x40 [ 909.423395] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.423976] RIP: 0033:0x7f1a21aba04a [ 909.424398] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.426486] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.427350] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 909.428160] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.428984] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 909.429792] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.430601] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 909.431427] CPU: 1 PID: 6197 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 909.433034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.434883] Call Trace: [ 909.435471] dump_stack+0x107/0x167 [ 909.436292] should_fail.cold+0x5/0xa [ 909.437151] ? create_object.isra.0+0x3a/0xa20 [ 909.438175] should_failslab+0x5/0x20 [ 909.439030] kmem_cache_alloc+0x5b/0x310 [ 909.439944] create_object.isra.0+0x3a/0xa20 [ 909.440935] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.442078] kmem_cache_alloc_trace+0x151/0x320 15:45:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:45:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4300000, 0x0, 0x0, 0x0, 0x0) 15:45:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 1) 15:45:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) 15:45:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) [ 909.443135] copy_mount_options+0x55/0x180 [ 909.444220] __x64_sys_mount+0x1a8/0x300 [ 909.445391] ? copy_mnt_ns+0xa00/0xa00 [ 909.446373] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.447683] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.448998] do_syscall_64+0x33/0x40 [ 909.449888] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.450945] RIP: 0033:0x7f7b7cfaa04a [ 909.451722] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.455566] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.457167] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 909.458645] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.460137] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 909.461698] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.462526] EXT4-fs: 1 callbacks suppressed [ 909.462534] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.463193] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 909.467613] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) [ 909.481247] FAULT_INJECTION: forcing a failure. [ 909.481247] name failslab, interval 1, probability 0, space 0, times 0 [ 909.483800] CPU: 1 PID: 6201 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 909.485228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.486931] Call Trace: [ 909.487476] dump_stack+0x107/0x167 [ 909.488239] should_fail.cold+0x5/0xa [ 909.489053] ? getname_flags.part.0+0x50/0x4f0 [ 909.490015] should_failslab+0x5/0x20 [ 909.490799] kmem_cache_alloc+0x5b/0x310 [ 909.491647] getname_flags.part.0+0x50/0x4f0 [ 909.492553] user_path_at_empty+0xa1/0x100 [ 909.493446] __x64_sys_mount+0x1e9/0x300 [ 909.494290] ? copy_mnt_ns+0xa00/0xa00 [ 909.495105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.496198] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.497290] do_syscall_64+0x33/0x40 [ 909.498069] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.499140] RIP: 0033:0x7ff6a271404a [ 909.499916] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.503782] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.505381] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 909.506862] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.508343] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 15:45:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) [ 909.509833] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.511443] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 909.523283] FAULT_INJECTION: forcing a failure. [ 909.523283] name failslab, interval 1, probability 0, space 0, times 0 [ 909.524633] CPU: 0 PID: 6207 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 909.525410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.526351] Call Trace: [ 909.526658] dump_stack+0x107/0x167 [ 909.527071] should_fail.cold+0x5/0xa [ 909.527506] ? getname_flags.part.0+0x50/0x4f0 [ 909.528031] should_failslab+0x5/0x20 [ 909.528462] kmem_cache_alloc+0x5b/0x310 [ 909.528935] getname_flags.part.0+0x50/0x4f0 [ 909.529434] getname_flags+0x9a/0xe0 [ 909.529727] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.529858] do_mkdirat+0x8f/0x2b0 [ 909.529871] ? user_path_create+0xf0/0xf0 [ 909.529892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.529913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.532261] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.532450] do_syscall_64+0x33/0x40 [ 909.535446] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.536032] RIP: 0033:0x7f2f885a2c27 [ 909.536453] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.538561] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 909.539436] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a2c27 [ 909.540251] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 909.541073] RBP: 00007f2f85b19040 R08: 0000000000000000 R09: 0000000000388460 [ 909.541890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 909.542705] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 909.546885] FAULT_INJECTION: forcing a failure. [ 909.546885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.548291] CPU: 0 PID: 6206 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 909.549076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.550012] Call Trace: [ 909.550308] dump_stack+0x107/0x167 [ 909.550720] should_fail.cold+0x5/0xa [ 909.551155] _copy_from_user+0x2e/0x1b0 [ 909.551611] copy_mount_options+0x76/0x180 [ 909.552095] __x64_sys_mount+0x1a8/0x300 [ 909.552552] ? copy_mnt_ns+0xa00/0xa00 [ 909.553007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.553603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.554192] do_syscall_64+0x33/0x40 [ 909.554614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.555197] RIP: 0033:0x7f1dc49e504a [ 909.555621] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.557721] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.558594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 909.559407] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.560217] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 909.561038] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.561850] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 909.567522] FAULT_INJECTION: forcing a failure. [ 909.567522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.568922] CPU: 0 PID: 6203 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 909.569695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.570633] Call Trace: [ 909.570931] dump_stack+0x107/0x167 [ 909.571341] should_fail.cold+0x5/0xa [ 909.571780] strncpy_from_user+0x34/0x470 [ 909.572249] getname_flags.part.0+0x95/0x4f0 [ 909.572751] getname_flags+0x9a/0xe0 [ 909.573184] do_mkdirat+0x8f/0x2b0 [ 909.573590] ? user_path_create+0xf0/0xf0 [ 909.574071] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.574666] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.575261] do_syscall_64+0x33/0x40 [ 909.575682] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.576200] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.576271] RIP: 0033:0x7fb22fefec27 [ 909.576289] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.580493] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 909.581111] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.581366] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22fefec27 [ 909.581381] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 909.584680] RBP: 00007fb22d475040 R08: 0000000000000000 R09: 0000000000388460 [ 909.585495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 909.586311] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 15:45:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) 15:45:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 15:45:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) [ 909.611670] FAULT_INJECTION: forcing a failure. [ 909.611670] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.613068] CPU: 0 PID: 6212 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 909.613845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.614784] Call Trace: [ 909.615088] dump_stack+0x107/0x167 [ 909.615502] should_fail.cold+0x5/0xa [ 909.615944] strncpy_from_user+0x34/0x470 [ 909.616415] getname_flags.part.0+0x95/0x4f0 [ 909.616925] user_path_at_empty+0xa1/0x100 [ 909.617405] __x64_sys_mount+0x1e9/0x300 [ 909.617870] ? copy_mnt_ns+0xa00/0xa00 [ 909.618315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.618913] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.619502] do_syscall_64+0x33/0x40 [ 909.619925] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.620508] RIP: 0033:0x7f1a21aba04a [ 909.620940] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.623036] FAULT_INJECTION: forcing a failure. [ 909.623036] name failslab, interval 1, probability 0, space 0, times 0 [ 909.623053] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.626233] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 909.627046] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.627862] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 909.628680] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.629500] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 909.630338] CPU: 1 PID: 6211 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 909.631779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.633517] Call Trace: [ 909.634071] dump_stack+0x107/0x167 [ 909.634833] should_fail.cold+0x5/0xa [ 909.635629] ? create_object.isra.0+0x3a/0xa20 [ 909.636586] should_failslab+0x5/0x20 [ 909.637384] kmem_cache_alloc+0x5b/0x310 [ 909.637687] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.638233] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.638255] create_object.isra.0+0x3a/0xa20 [ 909.641143] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.642197] kmem_cache_alloc+0x159/0x310 [ 909.643067] getname_flags.part.0+0x50/0x4f0 [ 909.643990] user_path_at_empty+0xa1/0x100 [ 909.644881] __x64_sys_mount+0x1e9/0x300 [ 909.645725] ? copy_mnt_ns+0xa00/0xa00 [ 909.646543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.647632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.648708] do_syscall_64+0x33/0x40 [ 909.649491] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.650560] RIP: 0033:0x7ff6a271404a [ 909.651334] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.655178] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.656753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 909.658246] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.659728] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 909.661227] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.662716] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:45:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) 15:45:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) 15:45:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 15:45:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) [ 909.700081] FAULT_INJECTION: forcing a failure. [ 909.700081] name failslab, interval 1, probability 0, space 0, times 0 [ 909.701435] CPU: 0 PID: 6221 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 909.702207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.703143] Call Trace: [ 909.703440] dump_stack+0x107/0x167 [ 909.703850] should_fail.cold+0x5/0xa [ 909.704292] ? getname_flags.part.0+0x50/0x4f0 [ 909.704817] should_failslab+0x5/0x20 [ 909.705251] kmem_cache_alloc+0x5b/0x310 [ 909.705710] getname_flags.part.0+0x50/0x4f0 [ 909.706224] user_path_at_empty+0xa1/0x100 [ 909.706703] __x64_sys_mount+0x1e9/0x300 [ 909.707162] ? copy_mnt_ns+0xa00/0xa00 [ 909.707611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.708207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.708799] do_syscall_64+0x33/0x40 [ 909.709228] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.709811] RIP: 0033:0x7ff67ee7d04a [ 909.710239] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.711476] FAULT_INJECTION: forcing a failure. [ 909.711476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.712331] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.712342] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 909.712348] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.712354] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 909.712370] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.718864] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 909.719690] CPU: 1 PID: 6216 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 909.721165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.722938] Call Trace: [ 909.723500] dump_stack+0x107/0x167 [ 909.724278] should_fail.cold+0x5/0xa [ 909.725107] _copy_from_user+0x2e/0x1b0 [ 909.725813] FAULT_INJECTION: forcing a failure. [ 909.725813] name failslab, interval 1, probability 0, space 0, times 0 [ 909.725930] copy_mount_options+0x76/0x180 [ 909.728021] __x64_sys_mount+0x1a8/0x300 [ 909.728870] ? copy_mnt_ns+0xa00/0xa00 [ 909.729675] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.730759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.731826] do_syscall_64+0x33/0x40 [ 909.732591] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.733665] RIP: 0033:0x7f7b7cfaa04a [ 909.734429] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.738223] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.739791] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 909.741269] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.742733] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 909.744207] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.745693] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 909.747185] CPU: 0 PID: 6224 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 909.747965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.748905] Call Trace: [ 909.749196] dump_stack+0x107/0x167 [ 909.749599] should_fail.cold+0x5/0xa [ 909.750029] should_failslab+0x5/0x20 [ 909.750457] __kmalloc_track_caller+0x79/0x370 [ 909.750961] ? strndup_user+0x74/0xe0 [ 909.751379] ? getname_flags.part.0+0x1dd/0x4f0 [ 909.751891] memdup_user+0x22/0xd0 [ 909.752280] strndup_user+0x74/0xe0 [ 909.752688] __x64_sys_mount+0x133/0x300 [ 909.753142] ? copy_mnt_ns+0xa00/0xa00 [ 909.753573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.754156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.754742] do_syscall_64+0x33/0x40 [ 909.755151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.755715] RIP: 0033:0x7fb22ff0104a [ 909.756126] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.758072] FAULT_INJECTION: forcing a failure. [ 909.758072] name failslab, interval 1, probability 0, space 0, times 0 [ 909.758174] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.761321] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 909.762117] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.762920] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 909.763711] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.764515] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 909.765347] CPU: 1 PID: 6222 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 909.766791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.768541] Call Trace: [ 909.769111] dump_stack+0x107/0x167 [ 909.769880] should_fail.cold+0x5/0xa [ 909.770678] ? alloc_fs_context+0x57/0x840 [ 909.771570] should_failslab+0x5/0x20 [ 909.772369] kmem_cache_alloc_trace+0x55/0x320 [ 909.773338] ? cap_capable+0x1cd/0x230 [ 909.774151] ? cap_capable+0x1cd/0x230 [ 909.774966] alloc_fs_context+0x57/0x840 15:45:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) [ 909.775821] path_mount+0x962/0x2120 [ 909.776777] ? strncpy_from_user+0x9e/0x470 [ 909.777692] ? finish_automount+0xa90/0xa90 [ 909.778603] ? getname_flags.part.0+0x1dd/0x4f0 [ 909.779595] __x64_sys_mount+0x282/0x300 [ 909.780444] ? copy_mnt_ns+0xa00/0xa00 [ 909.781269] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.782371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.783459] do_syscall_64+0x33/0x40 [ 909.784244] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.785322] RIP: 0033:0x7f1a21aba04a 15:45:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) [ 909.786094] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:45:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) [ 909.790073] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.791726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 909.793217] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.794718] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 909.796202] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.797694] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 909.834697] FAULT_INJECTION: forcing a failure. [ 909.834697] name failslab, interval 1, probability 0, space 0, times 0 [ 909.836037] CPU: 0 PID: 6230 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 909.836420] FAULT_INJECTION: forcing a failure. [ 909.836420] name failslab, interval 1, probability 0, space 0, times 0 [ 909.836805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.836808] Call Trace: [ 909.836823] dump_stack+0x107/0x167 [ 909.836834] should_fail.cold+0x5/0xa [ 909.836851] ? create_object.isra.0+0x3a/0xa20 [ 909.836872] should_failslab+0x5/0x20 [ 909.842065] kmem_cache_alloc+0x5b/0x310 [ 909.842515] create_object.isra.0+0x3a/0xa20 [ 909.843004] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.843568] __kmalloc_track_caller+0x177/0x370 [ 909.844080] ? strndup_user+0x74/0xe0 [ 909.844501] ? getname_flags.part.0+0x1dd/0x4f0 [ 909.845023] memdup_user+0x22/0xd0 [ 909.845414] strndup_user+0x74/0xe0 [ 909.845818] __x64_sys_mount+0x133/0x300 [ 909.846265] ? copy_mnt_ns+0xa00/0xa00 [ 909.846701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.847287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.847860] do_syscall_64+0x33/0x40 [ 909.848275] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.848856] RIP: 0033:0x7fb22ff0104a [ 909.849276] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.851319] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.852166] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 909.852967] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.853756] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 909.854547] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.855343] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 909.856157] CPU: 1 PID: 6229 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 909.857609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 909.859335] Call Trace: [ 909.859881] dump_stack+0x107/0x167 [ 909.860646] should_fail.cold+0x5/0xa [ 909.861043] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.861451] ? create_object.isra.0+0x3a/0xa20 [ 909.863278] should_failslab+0x5/0x20 [ 909.864075] kmem_cache_alloc+0x5b/0x310 [ 909.864936] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.866040] create_object.isra.0+0x3a/0xa20 [ 909.866955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 909.868020] kmem_cache_alloc+0x159/0x310 [ 909.868915] getname_flags.part.0+0x50/0x4f0 [ 909.869867] user_path_at_empty+0xa1/0x100 [ 909.870747] __x64_sys_mount+0x1e9/0x300 [ 909.871595] ? copy_mnt_ns+0xa00/0xa00 [ 909.872408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 909.873511] ? syscall_enter_from_user_mode+0x1d/0x50 [ 909.874387] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 909.874584] do_syscall_64+0x33/0x40 [ 909.876256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 909.877330] RIP: 0033:0x7ff67ee7d04a [ 909.878106] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.881930] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 909.883510] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 909.884992] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 909.886478] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 909.887960] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 909.889495] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 909.905941] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 2) 15:45:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:45:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:45:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) 15:45:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, 0x0) 15:45:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) 15:45:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) 15:45:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) [ 922.185709] FAULT_INJECTION: forcing a failure. [ 922.185709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.187483] CPU: 1 PID: 6237 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 922.188498] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.189723] Call Trace: [ 922.190113] dump_stack+0x107/0x167 [ 922.190651] should_fail.cold+0x5/0xa [ 922.191222] strncpy_from_user+0x34/0x470 [ 922.191837] getname_flags.part.0+0x95/0x4f0 [ 922.192492] user_path_at_empty+0xa1/0x100 [ 922.193122] __x64_sys_mount+0x1e9/0x300 [ 922.193736] ? copy_mnt_ns+0xa00/0xa00 [ 922.194313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.195087] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.195852] do_syscall_64+0x33/0x40 [ 922.196414] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.197174] RIP: 0033:0x7ff6a271404a [ 922.197731] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.200462] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.201726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 922.202817] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.203908] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 922.204991] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.206087] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 922.228365] FAULT_INJECTION: forcing a failure. [ 922.228365] name failslab, interval 1, probability 0, space 0, times 0 [ 922.230069] CPU: 1 PID: 6247 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 922.231076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.232305] Call Trace: [ 922.232705] dump_stack+0x107/0x167 [ 922.233252] should_fail.cold+0x5/0xa [ 922.233824] ? create_object.isra.0+0x3a/0xa20 [ 922.234513] should_failslab+0x5/0x20 [ 922.235087] kmem_cache_alloc+0x5b/0x310 [ 922.235712] create_object.isra.0+0x3a/0xa20 [ 922.236367] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 922.237136] kmem_cache_alloc_trace+0x151/0x320 [ 922.237843] ? cap_capable+0x1cd/0x230 [ 922.238427] alloc_fs_context+0x57/0x840 [ 922.239039] path_mount+0x962/0x2120 [ 922.239604] ? strncpy_from_user+0x9e/0x470 [ 922.240251] ? finish_automount+0xa90/0xa90 [ 922.240895] ? getname_flags.part.0+0x1dd/0x4f0 [ 922.241609] __x64_sys_mount+0x282/0x300 [ 922.242219] ? copy_mnt_ns+0xa00/0xa00 [ 922.242802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.243582] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.244360] do_syscall_64+0x33/0x40 [ 922.244921] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.245685] RIP: 0033:0x7f1a21aba04a [ 922.246246] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.249020] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.250185] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 922.251245] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.252291] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 922.253366] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.254409] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 922.259763] FAULT_INJECTION: forcing a failure. [ 922.259763] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 922.261318] FAULT_INJECTION: forcing a failure. [ 922.261318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.262899] CPU: 0 PID: 6246 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 922.262915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.267775] Call Trace: [ 922.268332] dump_stack+0x107/0x167 [ 922.269096] should_fail.cold+0x5/0xa [ 922.269915] __alloc_pages_nodemask+0x182/0x600 [ 922.270892] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 922.272159] ? kmem_cache_alloc+0x301/0x310 [ 922.273065] alloc_pages_current+0x187/0x280 [ 922.273997] allocate_slab+0x26f/0x380 [ 922.274814] ___slab_alloc+0x470/0x700 [ 922.275628] ? getname_flags.part.0+0x50/0x4f0 [ 922.276582] ? ksys_write+0x21a/0x260 [ 922.277398] ? getname_flags.part.0+0x50/0x4f0 [ 922.278352] ? kmem_cache_alloc+0x301/0x310 [ 922.279256] kmem_cache_alloc+0x301/0x310 [ 922.280125] getname_flags.part.0+0x50/0x4f0 [ 922.281061] getname_flags+0x9a/0xe0 [ 922.281847] do_mkdirat+0x8f/0x2b0 [ 922.282590] ? user_path_create+0xf0/0xf0 [ 922.283467] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.284573] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.285662] do_syscall_64+0x33/0x40 [ 922.286438] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.287512] RIP: 0033:0x7f2f885a2c27 [ 922.288292] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.292143] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 922.293750] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a2c27 [ 922.295241] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 922.296737] RBP: 00007f2f85b19040 R08: 0000000000000000 R09: 0000000000388460 [ 922.298254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 922.299751] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 922.301274] CPU: 1 PID: 6249 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 922.302413] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 15:45:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, 0x0) [ 922.303697] Call Trace: [ 922.304220] dump_stack+0x107/0x167 [ 922.304762] should_fail.cold+0x5/0xa [ 922.305339] strncpy_from_user+0x34/0x470 [ 922.305955] getname_flags.part.0+0x95/0x4f0 [ 922.306598] user_path_at_empty+0xa1/0x100 [ 922.307225] __x64_sys_mount+0x1e9/0x300 [ 922.307814] ? copy_mnt_ns+0xa00/0xa00 [ 922.308399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.309153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.309924] do_syscall_64+0x33/0x40 [ 922.310467] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.310972] EXT4-fs: 1 callbacks suppressed [ 922.310986] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 922.311226] RIP: 0033:0x7ff67ee7d04a [ 922.311246] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.316580] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.317719] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 922.318772] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.319826] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 922.320881] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.321944] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 922.323138] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 922.327085] FAULT_INJECTION: forcing a failure. [ 922.327085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.328932] CPU: 1 PID: 6253 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 922.329960] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.331189] Call Trace: [ 922.331574] dump_stack+0x107/0x167 [ 922.332112] should_fail.cold+0x5/0xa [ 922.332677] _copy_from_user+0x2e/0x1b0 [ 922.333276] memdup_user+0x65/0xd0 [ 922.333800] strndup_user+0x74/0xe0 [ 922.334336] __x64_sys_mount+0x133/0x300 [ 922.334932] ? copy_mnt_ns+0xa00/0xa00 [ 922.335496] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.336281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.337039] do_syscall_64+0x33/0x40 [ 922.337680] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.338616] RIP: 0033:0x7fb22ff0104a [ 922.339183] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.341890] RSP: 002b:00007fb22d453fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 922.343023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 922.344077] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.345137] RBP: 00007fb22d454040 R08: 00007fb22d454040 R09: 0000000020000300 [ 922.346218] R10: 0000000000388460 R11: 0000000000000202 R12: 0000000020000300 [ 922.347269] R13: 0000000020000380 R14: 00007fb22d454000 R15: 0000000020001ac0 [ 922.352479] FAULT_INJECTION: forcing a failure. [ 922.352479] name failslab, interval 1, probability 0, space 0, times 0 [ 922.354192] CPU: 1 PID: 6250 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 922.355172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.356378] Call Trace: [ 922.356755] dump_stack+0x107/0x167 [ 922.357333] should_fail.cold+0x5/0xa [ 922.357904] ? getname_flags.part.0+0x50/0x4f0 [ 922.358592] should_failslab+0x5/0x20 15:45:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) [ 922.359141] kmem_cache_alloc+0x5b/0x310 [ 922.359842] getname_flags.part.0+0x50/0x4f0 [ 922.360513] user_path_at_empty+0xa1/0x100 [ 922.361124] __x64_sys_mount+0x1e9/0x300 [ 922.361737] ? copy_mnt_ns+0xa00/0xa00 [ 922.362317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.363080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.363824] do_syscall_64+0x33/0x40 [ 922.364365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.365114] RIP: 0033:0x7f7b7cfaa04a [ 922.365653] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.368300] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.369426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 922.370455] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.371472] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 922.372487] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.373527] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 922.375658] FAULT_INJECTION: forcing a failure. [ 922.375658] name failslab, interval 1, probability 0, space 0, times 0 [ 922.377347] CPU: 1 PID: 6251 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 922.378317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.379503] Call Trace: [ 922.379876] dump_stack+0x107/0x167 [ 922.380411] should_fail.cold+0x5/0xa [ 922.380968] ? getname_flags.part.0+0x50/0x4f0 [ 922.381660] should_failslab+0x5/0x20 [ 922.382221] kmem_cache_alloc+0x5b/0x310 [ 922.382804] getname_flags.part.0+0x50/0x4f0 [ 922.383433] user_path_at_empty+0xa1/0x100 [ 922.384048] __x64_sys_mount+0x1e9/0x300 [ 922.384625] ? copy_mnt_ns+0xa00/0xa00 [ 922.385188] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.385955] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.386696] do_syscall_64+0x33/0x40 [ 922.387234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.387963] RIP: 0033:0x7f1dc49e504a [ 922.388494] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.391123] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.392217] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 922.393236] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.394249] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 922.395271] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.396288] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:45:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 15:45:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 3) 15:45:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 922.446300] FAULT_INJECTION: forcing a failure. [ 922.446300] name failslab, interval 1, probability 0, space 0, times 0 [ 922.448713] CPU: 0 PID: 6256 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 922.450169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.451901] Call Trace: [ 922.452455] dump_stack+0x107/0x167 [ 922.453218] should_fail.cold+0x5/0xa [ 922.454028] ? alloc_fs_context+0x57/0x840 [ 922.454917] should_failslab+0x5/0x20 [ 922.455716] kmem_cache_alloc_trace+0x55/0x320 [ 922.456673] ? cap_capable+0x1cd/0x230 [ 922.457493] ? cap_capable+0x1cd/0x230 [ 922.458311] alloc_fs_context+0x57/0x840 [ 922.459171] path_mount+0x962/0x2120 [ 922.459957] ? strncpy_from_user+0x9e/0x470 [ 922.460858] ? finish_automount+0xa90/0xa90 [ 922.461899] ? getname_flags.part.0+0x1dd/0x4f0 [ 922.463056] __x64_sys_mount+0x282/0x300 [ 922.464042] ? copy_mnt_ns+0xa00/0xa00 [ 922.465001] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.466300] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.467556] do_syscall_64+0x33/0x40 [ 922.468461] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.469733] RIP: 0033:0x7ff6a271404a [ 922.470633] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.475234] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.477109] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 922.478871] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.480679] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 922.482491] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.483158] FAULT_INJECTION: forcing a failure. [ 922.483158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.484225] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 922.487053] CPU: 1 PID: 6260 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 922.488058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.489291] Call Trace: [ 922.489683] dump_stack+0x107/0x167 [ 922.490221] should_fail.cold+0x5/0xa [ 922.490788] strncpy_from_user+0x34/0x470 [ 922.491401] getname_flags.part.0+0x95/0x4f0 [ 922.492051] getname_flags+0x9a/0xe0 [ 922.492600] do_mkdirat+0x8f/0x2b0 [ 922.493133] ? user_path_create+0xf0/0xf0 [ 922.493759] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.494527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.495276] do_syscall_64+0x33/0x40 [ 922.495822] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.496577] RIP: 0033:0x7f2f885a2c27 [ 922.497117] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:45:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:45:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) 15:45:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) [ 922.499832] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 922.501216] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a2c27 [ 922.502218] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000380 [ 922.503212] RBP: 00007f2f85b19040 R08: 0000000000000000 R09: 0000000000388460 [ 922.504197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000300 [ 922.505199] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 922.537277] FAULT_INJECTION: forcing a failure. [ 922.537277] name failslab, interval 1, probability 0, space 0, times 0 [ 922.539663] CPU: 0 PID: 6262 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 922.541067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.542776] Call Trace: [ 922.543318] dump_stack+0x107/0x167 [ 922.544081] should_fail.cold+0x5/0xa [ 922.544870] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 922.545968] should_failslab+0x5/0x20 [ 922.546752] __kmalloc_node+0x76/0x420 [ 922.547567] ? lock_downgrade+0x6d0/0x6d0 [ 922.548166] FAULT_INJECTION: forcing a failure. [ 922.548166] name failslab, interval 1, probability 0, space 0, times 0 [ 922.548429] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 922.551014] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 922.552062] ? trace_hardirqs_on+0x5b/0x180 [ 922.552968] kmem_cache_alloc_trace+0x169/0x320 [ 922.553940] ? cap_capable+0x1cd/0x230 [ 922.554757] alloc_fs_context+0x57/0x840 [ 922.555599] path_mount+0x962/0x2120 [ 922.556381] ? strncpy_from_user+0x9e/0x470 [ 922.557275] ? finish_automount+0xa90/0xa90 [ 922.558163] ? getname_flags.part.0+0x1dd/0x4f0 [ 922.559124] __x64_sys_mount+0x282/0x300 [ 922.559959] ? copy_mnt_ns+0xa00/0xa00 [ 922.560765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.561852] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.562918] do_syscall_64+0x33/0x40 [ 922.563688] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.564747] RIP: 0033:0x7f1a21aba04a [ 922.565541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.569350] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.570930] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 922.572417] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.573896] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 922.575368] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.576842] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 922.578368] CPU: 1 PID: 6266 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 922.579476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.579793] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 922.580697] Call Trace: [ 922.582658] dump_stack+0x107/0x167 [ 922.583174] should_fail.cold+0x5/0xa 15:45:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, 0x0) [ 922.583713] ? create_object.isra.0+0x3a/0xa20 [ 922.584688] should_failslab+0x5/0x20 [ 922.585332] kmem_cache_alloc+0x5b/0x310 [ 922.586005] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.586840] create_object.isra.0+0x3a/0xa20 [ 922.587464] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 922.588283] kmem_cache_alloc+0x159/0x310 [ 922.588944] getname_flags.part.0+0x50/0x4f0 [ 922.589617] user_path_at_empty+0xa1/0x100 [ 922.590236] __x64_sys_mount+0x1e9/0x300 [ 922.590826] ? copy_mnt_ns+0xa00/0xa00 [ 922.591394] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.592159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.592923] do_syscall_64+0x33/0x40 [ 922.593479] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.594210] RIP: 0033:0x7f1dc49e504a [ 922.594710] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.597441] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.598683] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 922.599831] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.600987] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 922.602152] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.603304] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 922.604380] FAULT_INJECTION: forcing a failure. [ 922.604380] name failslab, interval 1, probability 0, space 0, times 0 [ 922.606921] FAULT_INJECTION: forcing a failure. [ 922.606921] name failslab, interval 1, probability 0, space 0, times 0 [ 922.606939] CPU: 1 PID: 6270 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 922.606947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.606952] Call Trace: [ 922.606968] dump_stack+0x107/0x167 [ 922.606985] should_fail.cold+0x5/0xa [ 922.607006] ? create_object.isra.0+0x3a/0xa20 [ 922.614574] should_failslab+0x5/0x20 [ 922.615592] kmem_cache_alloc+0x5b/0x310 [ 922.616668] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.618047] create_object.isra.0+0x3a/0xa20 [ 922.619056] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 922.620226] kmem_cache_alloc+0x159/0x310 [ 922.621182] getname_flags.part.0+0x50/0x4f0 [ 922.622205] user_path_at_empty+0xa1/0x100 [ 922.623171] __x64_sys_mount+0x1e9/0x300 [ 922.624086] ? copy_mnt_ns+0xa00/0xa00 [ 922.624976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.626179] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.627350] do_syscall_64+0x33/0x40 [ 922.628198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.629524] RIP: 0033:0x7f7b7cfaa04a [ 922.630582] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.635544] RSP: 002b:00007f7b7a4fcfa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 922.637710] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 922.639696] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.641541] RBP: 00007f7b7a4fd040 R08: 00007f7b7a4fd040 R09: 0000000020000300 [ 922.643346] R10: 0000000000388460 R11: 0000000000000202 R12: 0000000020000300 [ 922.645133] R13: 0000000020000380 R14: 00007f7b7a4fd000 R15: 0000000020001ac0 [ 922.646795] CPU: 0 PID: 6269 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 922.648509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 922.650417] Call Trace: [ 922.651051] dump_stack+0x107/0x167 [ 922.651902] should_fail.cold+0x5/0xa [ 922.652815] ? copy_mount_options+0x55/0x180 [ 922.653884] should_failslab+0x5/0x20 [ 922.654794] kmem_cache_alloc_trace+0x55/0x320 [ 922.655883] ? _copy_from_user+0xfb/0x1b0 [ 922.656918] copy_mount_options+0x55/0x180 [ 922.657999] __x64_sys_mount+0x1a8/0x300 [ 922.659026] ? copy_mnt_ns+0xa00/0xa00 [ 922.660016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 922.661363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 922.662651] do_syscall_64+0x33/0x40 [ 922.663588] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 922.664871] RIP: 0033:0x7fb22ff0104a [ 922.665827] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.670383] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 922.672302] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 922.673975] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 922.675613] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 922.677145] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 922.678679] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 922.728502] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 922.731067] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 922.761823] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:45:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) 15:45:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:45:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) 15:45:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) [ 937.329238] FAULT_INJECTION: forcing a failure. [ 937.329238] name failslab, interval 1, probability 0, space 0, times 0 [ 937.331532] CPU: 1 PID: 6281 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 937.332805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.334348] Call Trace: [ 937.334843] dump_stack+0x107/0x167 [ 937.335544] should_fail.cold+0x5/0xa [ 937.336260] ? create_object.isra.0+0x3a/0xa20 [ 937.337118] should_failslab+0x5/0x20 [ 937.337847] kmem_cache_alloc+0x5b/0x310 [ 937.338618] create_object.isra.0+0x3a/0xa20 [ 937.339447] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.340405] kmem_cache_alloc_trace+0x151/0x320 [ 937.341287] copy_mount_options+0x55/0x180 [ 937.342091] __x64_sys_mount+0x1a8/0x300 [ 937.342863] ? copy_mnt_ns+0xa00/0xa00 [ 937.343602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.344594] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.345571] do_syscall_64+0x33/0x40 15:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x12010000, 0x0, 0x0, 0x0, 0x0) 15:45:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 4) 15:45:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) 15:45:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) [ 937.346283] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.347413] RIP: 0033:0x7fb22ff0104a [ 937.348119] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.351491] FAULT_INJECTION: forcing a failure. [ 937.351491] name failslab, interval 1, probability 0, space 0, times 0 [ 937.351664] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.351683] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 937.351703] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.358148] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 937.359513] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.360881] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 937.362294] CPU: 0 PID: 6286 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 937.363690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.365361] Call Trace: [ 937.365916] dump_stack+0x107/0x167 [ 937.366648] should_fail.cold+0x5/0xa [ 937.367423] ? create_object.isra.0+0x3a/0xa20 [ 937.368348] should_failslab+0x5/0x20 [ 937.369110] kmem_cache_alloc+0x5b/0x310 [ 937.369946] create_object.isra.0+0x3a/0xa20 [ 937.370827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.371858] kmem_cache_alloc_trace+0x151/0x320 [ 937.372795] ? lockdep_init_map_type+0x2c7/0x780 [ 937.373767] legacy_init_fs_context+0x44/0xe0 [ 937.374680] ? generic_parse_monolithic+0x1f0/0x1f0 [ 937.375720] alloc_fs_context+0x4fd/0x840 [ 937.376564] path_mount+0x962/0x2120 [ 937.377321] ? strncpy_from_user+0x9e/0x470 [ 937.378199] ? finish_automount+0xa90/0xa90 [ 937.379067] ? getname_flags.part.0+0x1dd/0x4f0 [ 937.380011] __x64_sys_mount+0x282/0x300 [ 937.380826] ? copy_mnt_ns+0xa00/0xa00 [ 937.381610] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.382683] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.383730] do_syscall_64+0x33/0x40 [ 937.384510] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.385546] RIP: 0033:0x7f1a21aba04a [ 937.386340] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.387242] FAULT_INJECTION: forcing a failure. [ 937.387242] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 937.390073] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.390094] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 937.390113] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.396728] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 937.398174] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.399605] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 937.401061] CPU: 1 PID: 6291 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 937.402449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.404109] Call Trace: [ 937.404631] dump_stack+0x107/0x167 [ 937.405357] should_fail.cold+0x5/0xa [ 937.406127] strncpy_from_user+0x34/0x470 [ 937.406956] getname_flags.part.0+0x95/0x4f0 [ 937.407831] user_path_at_empty+0xa1/0x100 [ 937.408666] __x64_sys_mount+0x1e9/0x300 [ 937.409467] ? copy_mnt_ns+0xa00/0xa00 [ 937.410253] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.411298] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.412332] do_syscall_64+0x33/0x40 [ 937.413079] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.414112] RIP: 0033:0x7f1dc49e504a [ 937.414861] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.416415] FAULT_INJECTION: forcing a failure. [ 937.416415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 937.418568] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.418588] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 937.418600] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.418620] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 937.426707] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.428144] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 937.429591] CPU: 0 PID: 6292 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 937.430990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.432670] Call Trace: [ 937.433207] dump_stack+0x107/0x167 [ 937.433949] should_fail.cold+0x5/0xa [ 937.434729] strncpy_from_user+0x34/0x470 [ 937.435571] getname_flags.part.0+0x95/0x4f0 [ 937.436465] user_path_at_empty+0xa1/0x100 [ 937.437313] __x64_sys_mount+0x1e9/0x300 [ 937.438136] ? copy_mnt_ns+0xa00/0xa00 [ 937.438921] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.440016] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.441062] do_syscall_64+0x33/0x40 [ 937.441850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.442880] RIP: 0033:0x7f7b7cfaa04a [ 937.443652] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.447353] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.448933] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 937.450389] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.451830] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 937.452593] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 937.453261] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.453272] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 937.454828] FAULT_INJECTION: forcing a failure. [ 937.454828] name failslab, interval 1, probability 0, space 0, times 0 [ 937.456399] FAULT_INJECTION: forcing a failure. [ 937.456399] name failslab, interval 1, probability 0, space 0, times 0 [ 937.456561] CPU: 0 PID: 6293 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 937.463672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.465345] Call Trace: [ 937.465881] dump_stack+0x107/0x167 [ 937.466615] should_fail.cold+0x5/0xa [ 937.467387] should_failslab+0x5/0x20 [ 937.468152] __kmalloc_track_caller+0x79/0x370 [ 937.469078] ? strndup_user+0x74/0xe0 [ 937.469851] ? getname_flags.part.0+0x1dd/0x4f0 [ 937.470788] memdup_user+0x22/0xd0 [ 937.471505] strndup_user+0x74/0xe0 [ 937.472244] __x64_sys_mount+0x133/0x300 [ 937.473095] ? copy_mnt_ns+0xa00/0xa00 [ 937.473897] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.474951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.475997] do_syscall_64+0x33/0x40 [ 937.476754] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.477794] RIP: 0033:0x7f2f885a504a [ 937.478541] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.482251] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.483784] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 937.485228] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.486671] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 937.488111] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.489554] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 937.491027] CPU: 1 PID: 6285 Comm: syz-executor.0 Not tainted 5.10.233 #1 15:45:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1ffff000, 0x0, 0x0, 0x0, 0x0) [ 937.492450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.494381] Call Trace: [ 937.494921] dump_stack+0x107/0x167 [ 937.495676] should_fail.cold+0x5/0xa [ 937.496463] ? alloc_fs_context+0x57/0x840 [ 937.497343] should_failslab+0x5/0x20 [ 937.498156] kmem_cache_alloc_trace+0x55/0x320 [ 937.499109] ? cap_capable+0x1cd/0x230 [ 937.499916] ? cap_capable+0x1cd/0x230 [ 937.500729] alloc_fs_context+0x57/0x840 [ 937.501596] path_mount+0x962/0x2120 [ 937.502388] ? strncpy_from_user+0x9e/0x470 [ 937.503286] ? finish_automount+0xa90/0xa90 [ 937.504187] ? getname_flags.part.0+0x1dd/0x4f0 [ 937.505162] __x64_sys_mount+0x282/0x300 [ 937.506020] ? copy_mnt_ns+0xa00/0xa00 [ 937.506835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.507925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.508996] do_syscall_64+0x33/0x40 [ 937.509777] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.510841] RIP: 0033:0x7ff67ee7d04a [ 937.511614] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.515449] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.517040] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 937.518536] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.520024] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 937.521511] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.523006] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 937.527422] FAULT_INJECTION: forcing a failure. [ 937.527422] name failslab, interval 1, probability 0, space 0, times 0 [ 937.529792] CPU: 1 PID: 6283 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 937.531218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.532948] Call Trace: [ 937.533500] dump_stack+0x107/0x167 [ 937.534276] should_fail.cold+0x5/0xa [ 937.535082] ? create_object.isra.0+0x3a/0xa20 [ 937.536044] should_failslab+0x5/0x20 [ 937.536840] kmem_cache_alloc+0x5b/0x310 [ 937.537692] create_object.isra.0+0x3a/0xa20 [ 937.538621] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.538825] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 937.539685] kmem_cache_alloc_trace+0x151/0x320 [ 937.539702] ? cap_capable+0x1cd/0x230 [ 937.539725] alloc_fs_context+0x57/0x840 [ 937.543935] path_mount+0x962/0x2120 [ 937.544718] ? strncpy_from_user+0x9e/0x470 [ 937.545623] ? finish_automount+0xa90/0xa90 [ 937.546537] ? getname_flags.part.0+0x1dd/0x4f0 [ 937.547517] __x64_sys_mount+0x282/0x300 [ 937.548365] ? copy_mnt_ns+0xa00/0xa00 [ 937.549181] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.550282] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.551366] do_syscall_64+0x33/0x40 [ 937.552144] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 937.553213] RIP: 0033:0x7ff6a271404a [ 937.554008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.557894] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 937.559487] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 937.560982] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 937.562479] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 937.563965] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 937.565459] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 937.610879] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) 15:46:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:46:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 5) 15:46:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) 15:46:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) [ 953.361758] FAULT_INJECTION: forcing a failure. [ 953.361758] name failslab, interval 1, probability 0, space 0, times 0 [ 953.364580] CPU: 0 PID: 6305 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 953.366178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.368136] Call Trace: [ 953.368757] dump_stack+0x107/0x167 [ 953.369611] should_fail.cold+0x5/0xa [ 953.370516] ? create_object.isra.0+0x3a/0xa20 [ 953.371587] should_failslab+0x5/0x20 [ 953.372478] kmem_cache_alloc+0x5b/0x310 [ 953.373433] create_object.isra.0+0x3a/0xa20 [ 953.374460] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.375640] __kmalloc_track_caller+0x177/0x370 [ 953.376712] ? strndup_user+0x74/0xe0 [ 953.377591] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.378679] memdup_user+0x22/0xd0 [ 953.379501] strndup_user+0x74/0xe0 [ 953.380352] __x64_sys_mount+0x133/0x300 [ 953.381291] ? copy_mnt_ns+0xa00/0xa00 [ 953.382208] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.383435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.384643] do_syscall_64+0x33/0x40 [ 953.385511] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.386717] RIP: 0033:0x7f2f885a504a [ 953.387581] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.388493] FAULT_INJECTION: forcing a failure. [ 953.388493] name failslab, interval 1, probability 0, space 0, times 0 [ 953.391861] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.391883] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 953.391895] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.391906] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 953.391918] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.391940] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 953.404117] CPU: 1 PID: 6306 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 953.405543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.407270] Call Trace: [ 953.407826] dump_stack+0x107/0x167 [ 953.408578] should_fail.cold+0x5/0xa [ 953.409369] ? alloc_fs_context+0x57/0x840 [ 953.410253] should_failslab+0x5/0x20 [ 953.411055] kmem_cache_alloc_trace+0x55/0x320 [ 953.412004] ? cap_capable+0x1cd/0x230 [ 953.412805] ? cap_capable+0x1cd/0x230 [ 953.413609] alloc_fs_context+0x57/0x840 [ 953.414462] path_mount+0x962/0x2120 [ 953.415238] ? strncpy_from_user+0x9e/0x470 [ 953.416130] ? finish_automount+0xa90/0xa90 [ 953.417034] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.418011] __x64_sys_mount+0x282/0x300 [ 953.418856] ? copy_mnt_ns+0xa00/0xa00 [ 953.419670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.420759] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.421829] do_syscall_64+0x33/0x40 [ 953.422606] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.423670] RIP: 0033:0x7f1dc49e504a [ 953.424434] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.428241] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.429817] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 953.431105] FAULT_INJECTION: forcing a failure. [ 953.431105] name failslab, interval 1, probability 0, space 0, times 0 [ 953.431304] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.431324] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 953.436688] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.438164] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 953.439671] CPU: 0 PID: 6315 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 953.441174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.442990] Call Trace: [ 953.443568] dump_stack+0x107/0x167 [ 953.444360] should_fail.cold+0x5/0xa [ 953.445189] ? create_object.isra.0+0x3a/0xa20 [ 953.446191] should_failslab+0x5/0x20 [ 953.446845] FAULT_INJECTION: forcing a failure. [ 953.446845] name failslab, interval 1, probability 0, space 0, times 0 [ 953.447036] kmem_cache_alloc+0x5b/0x310 [ 953.450171] create_object.isra.0+0x3a/0xa20 [ 953.451128] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.452235] kmem_cache_alloc_trace+0x151/0x320 [ 953.453251] ? cap_capable+0x1cd/0x230 [ 953.454103] alloc_fs_context+0x57/0x840 [ 953.455006] path_mount+0x962/0x2120 [ 953.455820] ? strncpy_from_user+0x9e/0x470 [ 953.456756] ? finish_automount+0xa90/0xa90 [ 953.457679] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.458693] __x64_sys_mount+0x282/0x300 [ 953.459567] ? copy_mnt_ns+0xa00/0xa00 [ 953.460408] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.461533] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.462656] do_syscall_64+0x33/0x40 [ 953.463459] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.464557] RIP: 0033:0x7ff67ee7d04a [ 953.465353] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.469316] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.470955] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 953.472483] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.474027] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 953.475560] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.477067] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 953.478631] CPU: 1 PID: 6311 Comm: syz-executor.3 Not tainted 5.10.233 #1 15:46:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) 15:46:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 15:46:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 953.480087] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.482019] Call Trace: [ 953.482580] dump_stack+0x107/0x167 [ 953.482972] FAULT_INJECTION: forcing a failure. [ 953.482972] name failslab, interval 1, probability 0, space 0, times 0 [ 953.483343] should_fail.cold+0x5/0xa [ 953.486462] ? legacy_init_fs_context+0x44/0xe0 [ 953.487428] should_failslab+0x5/0x20 [ 953.488217] kmem_cache_alloc_trace+0x55/0x320 [ 953.489162] ? lockdep_init_map_type+0x2c7/0x780 [ 953.490145] legacy_init_fs_context+0x44/0xe0 [ 953.491079] ? generic_parse_monolithic+0x1f0/0x1f0 [ 953.492103] alloc_fs_context+0x4fd/0x840 [ 953.492972] path_mount+0x962/0x2120 [ 953.493747] ? strncpy_from_user+0x9e/0x470 [ 953.494647] ? finish_automount+0xa90/0xa90 [ 953.495539] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.496511] __x64_sys_mount+0x282/0x300 [ 953.497350] ? copy_mnt_ns+0xa00/0xa00 [ 953.498160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.499253] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.500318] do_syscall_64+0x33/0x40 [ 953.501093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.502151] RIP: 0033:0x7f1a21aba04a [ 953.502928] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.506754] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.508338] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 953.509835] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.511333] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 953.512819] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.514309] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 953.515817] CPU: 0 PID: 6316 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 953.517247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.518978] Call Trace: [ 953.519537] dump_stack+0x107/0x167 [ 953.520300] should_fail.cold+0x5/0xa [ 953.521091] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 953.522180] should_failslab+0x5/0x20 [ 953.522979] __kmalloc_node+0x76/0x420 [ 953.523788] ? lock_downgrade+0x6d0/0x6d0 [ 953.524643] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 953.525692] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 953.526776] ? trace_hardirqs_on+0x5b/0x180 [ 953.527671] kmem_cache_alloc_trace+0x169/0x320 [ 953.528797] ? cap_capable+0x1cd/0x230 [ 953.529757] alloc_fs_context+0x57/0x840 [ 953.530781] path_mount+0x962/0x2120 [ 953.531701] ? strncpy_from_user+0x9e/0x470 [ 953.532776] ? finish_automount+0xa90/0xa90 [ 953.533841] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.534997] __x64_sys_mount+0x282/0x300 [ 953.535993] ? copy_mnt_ns+0xa00/0xa00 [ 953.536959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.538259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.539540] do_syscall_64+0x33/0x40 [ 953.540462] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.541583] RIP: 0033:0x7ff6a271404a [ 953.542358] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.546153] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.547740] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 953.549221] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.550698] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 953.552168] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.553643] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 953.558421] FAULT_INJECTION: forcing a failure. [ 953.558421] name failslab, interval 1, probability 0, space 0, times 0 [ 953.560772] CPU: 0 PID: 6308 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 953.562190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.563937] Call Trace: [ 953.564491] dump_stack+0x107/0x167 [ 953.565263] should_fail.cold+0x5/0xa [ 953.566064] ? alloc_fs_context+0x57/0x840 [ 953.566972] should_failslab+0x5/0x20 [ 953.567787] kmem_cache_alloc_trace+0x55/0x320 [ 953.568743] ? cap_capable+0x1cd/0x230 [ 953.569571] ? cap_capable+0x1cd/0x230 [ 953.570412] alloc_fs_context+0x57/0x840 [ 953.571286] path_mount+0x962/0x2120 [ 953.572089] ? strncpy_from_user+0x9e/0x470 [ 953.572995] ? finish_automount+0xa90/0xa90 [ 953.573915] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.574946] __x64_sys_mount+0x282/0x300 [ 953.575830] ? copy_mnt_ns+0xa00/0xa00 [ 953.576690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.577824] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.578956] do_syscall_64+0x33/0x40 [ 953.579767] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.580823] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 953.580870] RIP: 0033:0x7f7b7cfaa04a [ 953.580890] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.580910] RSP: 002b:00007f7b7a51dfa8 EFLAGS: 00000206 [ 953.583071] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 953.583376] ORIG_RAX: 00000000000000a5 [ 953.583396] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cfaa04a [ 953.592422] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.593979] RBP: 00007f7b7a51e040 R08: 00007f7b7a51e040 R09: 0000000020000300 [ 953.595542] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.597098] R13: 0000000020000380 R14: 00007f7b7a51e000 R15: 0000000020001ac0 [ 953.602385] FAULT_INJECTION: forcing a failure. [ 953.602385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.604974] CPU: 0 PID: 6317 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 953.606484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.608298] Call Trace: [ 953.608887] dump_stack+0x107/0x167 [ 953.609689] should_fail.cold+0x5/0xa [ 953.610545] _copy_from_user+0x2e/0x1b0 [ 953.611425] copy_mount_options+0x76/0x180 [ 953.612369] __x64_sys_mount+0x1a8/0x300 [ 953.613272] ? copy_mnt_ns+0xa00/0xa00 [ 953.614146] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.615325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.616474] do_syscall_64+0x33/0x40 [ 953.617306] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.618457] RIP: 0033:0x7fb22ff0104a [ 953.619293] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.623441] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.625159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 953.626777] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.628388] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 953.630010] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.631645] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 15:46:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) [ 953.647567] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 953.650260] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) 15:46:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 6) 15:46:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) 15:46:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:46:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x21000000, 0x0, 0x0, 0x0, 0x0) 15:46:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 953.736437] FAULT_INJECTION: forcing a failure. [ 953.736437] name failslab, interval 1, probability 0, space 0, times 0 [ 953.738903] CPU: 0 PID: 6320 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 953.740323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.742032] Call Trace: [ 953.742597] dump_stack+0x107/0x167 [ 953.743353] should_fail.cold+0x5/0xa [ 953.744146] ? create_object.isra.0+0x3a/0xa20 [ 953.745120] should_failslab+0x5/0x20 [ 953.745911] kmem_cache_alloc+0x5b/0x310 [ 953.746776] create_object.isra.0+0x3a/0xa20 [ 953.747694] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.748761] kmem_cache_alloc_trace+0x151/0x320 [ 953.749730] alloc_fs_context+0x57/0x840 [ 953.750599] path_mount+0x962/0x2120 [ 953.751392] ? strncpy_from_user+0x9e/0x470 [ 953.752285] ? finish_automount+0xa90/0xa90 [ 953.753378] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.754577] __x64_sys_mount+0x282/0x300 [ 953.755544] ? copy_mnt_ns+0xa00/0xa00 [ 953.756498] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.757749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.758839] do_syscall_64+0x33/0x40 [ 953.759618] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.760692] RIP: 0033:0x7f1dc49e504a [ 953.761470] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.765334] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.766939] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 953.768437] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.769934] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 953.771439] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.772578] FAULT_INJECTION: forcing a failure. [ 953.772578] name failslab, interval 1, probability 0, space 0, times 0 [ 953.772934] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 953.777039] CPU: 1 PID: 6326 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 953.778470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.780190] Call Trace: [ 953.780746] dump_stack+0x107/0x167 [ 953.781506] should_fail.cold+0x5/0xa [ 953.782319] ? create_object.isra.0+0x3a/0xa20 [ 953.783280] should_failslab+0x5/0x20 [ 953.784079] kmem_cache_alloc+0x5b/0x310 [ 953.784932] create_object.isra.0+0x3a/0xa20 [ 953.785848] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 953.786924] kmem_cache_alloc_trace+0x151/0x320 [ 953.787900] ? lockdep_init_map_type+0x2c7/0x780 [ 953.788902] legacy_init_fs_context+0x44/0xe0 [ 953.789840] ? generic_parse_monolithic+0x1f0/0x1f0 [ 953.790886] alloc_fs_context+0x4fd/0x840 [ 953.791762] path_mount+0x962/0x2120 [ 953.792551] ? strncpy_from_user+0x9e/0x470 [ 953.793472] ? finish_automount+0xa90/0xa90 [ 953.794386] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.795364] __x64_sys_mount+0x282/0x300 [ 953.796035] FAULT_INJECTION: forcing a failure. [ 953.796035] name failslab, interval 1, probability 0, space 0, times 0 [ 953.796205] ? copy_mnt_ns+0xa00/0xa00 [ 953.796230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.796259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.801475] do_syscall_64+0x33/0x40 [ 953.802253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.803335] RIP: 0033:0x7f1a21aba04a [ 953.804109] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.807948] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.809532] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 953.811021] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.812510] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 953.814000] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.815488] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 953.817012] CPU: 0 PID: 6330 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 953.818472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.820206] Call Trace: [ 953.820761] dump_stack+0x107/0x167 [ 953.821524] should_fail.cold+0x5/0xa [ 953.822328] ? getname_flags.part.0+0x50/0x4f0 [ 953.823287] should_failslab+0x5/0x20 [ 953.824084] kmem_cache_alloc+0x5b/0x310 [ 953.824936] getname_flags.part.0+0x50/0x4f0 [ 953.825858] user_path_at_empty+0xa1/0x100 [ 953.826756] __x64_sys_mount+0x1e9/0x300 [ 953.827603] ? copy_mnt_ns+0xa00/0xa00 [ 953.828422] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.829189] FAULT_INJECTION: forcing a failure. [ 953.829189] name failslab, interval 1, probability 0, space 0, times 0 [ 953.829531] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.832879] do_syscall_64+0x33/0x40 [ 953.833664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.834740] RIP: 0033:0x7fb22ff0104a [ 953.835517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.839377] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.840955] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 953.842442] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.843910] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 953.845380] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.846861] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 953.848360] CPU: 1 PID: 6332 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 953.849218] FAULT_INJECTION: forcing a failure. [ 953.849218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.849766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.849772] Call Trace: [ 953.849791] dump_stack+0x107/0x167 [ 953.849815] should_fail.cold+0x5/0xa [ 953.855903] ? legacy_init_fs_context+0x44/0xe0 [ 953.856876] should_failslab+0x5/0x20 [ 953.857660] kmem_cache_alloc_trace+0x55/0x320 [ 953.858612] ? lockdep_init_map_type+0x2c7/0x780 [ 953.859603] legacy_init_fs_context+0x44/0xe0 [ 953.860526] ? generic_parse_monolithic+0x1f0/0x1f0 [ 953.861553] alloc_fs_context+0x4fd/0x840 [ 953.862423] path_mount+0x962/0x2120 [ 953.863196] ? strncpy_from_user+0x9e/0x470 [ 953.864085] ? finish_automount+0xa90/0xa90 [ 953.864969] ? getname_flags.part.0+0x1dd/0x4f0 [ 953.865937] __x64_sys_mount+0x282/0x300 [ 953.866784] ? copy_mnt_ns+0xa00/0xa00 [ 953.867597] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.868675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.869747] do_syscall_64+0x33/0x40 [ 953.870522] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.871587] RIP: 0033:0x7ff67ee7d04a [ 953.872360] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.876170] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 953.877745] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 953.879251] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.880717] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 953.882188] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 953.883667] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 953.885165] CPU: 0 PID: 6331 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 953.886592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.888300] Call Trace: [ 953.888535] FAULT_INJECTION: forcing a failure. [ 953.888535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.888845] dump_stack+0x107/0x167 [ 953.888865] should_fail.cold+0x5/0xa [ 953.888892] _copy_from_user+0x2e/0x1b0 [ 953.888913] memdup_user+0x65/0xd0 [ 953.888930] strndup_user+0x74/0xe0 [ 953.895198] __x64_sys_mount+0x133/0x300 [ 953.896032] ? copy_mnt_ns+0xa00/0xa00 [ 953.896838] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.897916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.899000] do_syscall_64+0x33/0x40 [ 953.899768] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.900825] RIP: 0033:0x7f2f885a504a [ 953.901601] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.905408] RSP: 002b:00007f2f85af7fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 953.906994] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 953.908482] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 953.909962] RBP: 00007f2f85af8040 R08: 00007f2f85af8040 R09: 0000000020000300 [ 953.911443] R10: 0000000000388460 R11: 0000000000000202 R12: 0000000020000300 [ 953.912910] R13: 0000000020000380 R14: 00007f2f85af8000 R15: 0000000020001ac0 [ 953.914414] CPU: 1 PID: 6333 Comm: syz-executor.2 Not tainted 5.10.233 #1 [ 953.915835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.917553] Call Trace: [ 953.918101] dump_stack+0x107/0x167 [ 953.918864] should_fail.cold+0x5/0xa [ 953.919658] _copy_from_user+0x2e/0x1b0 [ 953.920494] kstrtouint_from_user+0xbd/0x220 [ 953.921412] ? kstrtou8_from_user+0x210/0x210 [ 953.922375] ? lock_acquire+0x197/0x470 [ 953.923222] ? ksys_write+0x12d/0x260 [ 953.924037] proc_fail_nth_write+0x78/0x220 [ 953.924935] ? proc_task_getattr+0x1f0/0x1f0 [ 953.925868] ? proc_task_getattr+0x1f0/0x1f0 [ 953.926795] vfs_write+0x29a/0xb10 [ 953.927544] ksys_write+0x12d/0x260 [ 953.928305] ? __ia32_sys_read+0xb0/0xb0 [ 953.929158] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 953.930251] ? syscall_enter_from_user_mode+0x1d/0x50 [ 953.931334] do_syscall_64+0x33/0x40 [ 953.932112] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 953.933179] RIP: 0033:0x7f7b7cf5b5ff [ 953.933956] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 953.937795] RSP: 002b:00007f7b7a4fd170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 953.939389] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7b7cf5b5ff [ 953.940877] RDX: 0000000000000001 RSI: 00007f7b7a4fd1e0 RDI: 0000000000000003 [ 953.942378] RBP: 00007f7b7a4fd1d0 R08: 0000000000000000 R09: 0000000020000300 [ 953.944156] R10: 0000000000388460 R11: 0000000000000293 R12: 0000000000000002 [ 953.945871] R13: 00007fff1b2ce49f R14: 00007f7b7a4fd300 R15: 0000000000022000 [ 953.961071] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 953.964162] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:26 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) 15:46:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 7) 15:46:26 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) 15:46:26 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) 15:46:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x21030000, 0x0, 0x0, 0x0, 0x0) 15:46:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:46:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) 15:46:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 970.841112] FAULT_INJECTION: forcing a failure. [ 970.841112] name failslab, interval 1, probability 0, space 0, times 0 [ 970.843710] CPU: 0 PID: 6343 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 970.844075] FAULT_INJECTION: forcing a failure. [ 970.844075] name failslab, interval 1, probability 0, space 0, times 0 [ 970.845151] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.845158] Call Trace: [ 970.845185] dump_stack+0x107/0x167 [ 970.845205] should_fail.cold+0x5/0xa [ 970.845233] ? create_object.isra.0+0x3a/0xa20 [ 970.852483] should_failslab+0x5/0x20 [ 970.853313] kmem_cache_alloc+0x5b/0x310 [ 970.854191] ? create_object.isra.0+0x3ad/0xa20 [ 970.855240] create_object.isra.0+0x3a/0xa20 [ 970.856175] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 970.857294] __kmalloc_node+0x1ae/0x420 [ 970.858248] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 970.859401] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 970.860505] ? trace_hardirqs_on+0x5b/0x180 [ 970.861444] kmem_cache_alloc_trace+0x169/0x320 [ 970.862465] ? cap_capable+0x1cd/0x230 [ 970.863352] alloc_fs_context+0x57/0x840 [ 970.864264] path_mount+0x962/0x2120 [ 970.865269] ? strncpy_from_user+0x9e/0x470 [ 970.866494] ? finish_automount+0xa90/0xa90 [ 970.867720] ? getname_flags.part.0+0x1dd/0x4f0 [ 970.869044] __x64_sys_mount+0x282/0x300 [ 970.870174] ? copy_mnt_ns+0xa00/0xa00 [ 970.871279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.872719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.874181] do_syscall_64+0x33/0x40 [ 970.875246] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.876728] RIP: 0033:0x7ff67ee7d04a [ 970.877776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.882993] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 970.885160] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 970.887204] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 970.889217] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 970.891247] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 970.893252] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 970.895324] CPU: 1 PID: 6350 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 970.896856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.898670] Call Trace: [ 970.898867] FAULT_INJECTION: forcing a failure. [ 970.898867] name failslab, interval 1, probability 0, space 0, times 0 [ 970.899286] dump_stack+0x107/0x167 [ 970.903061] should_fail.cold+0x5/0xa [ 970.903927] ? copy_mount_options+0x55/0x180 [ 970.905130] should_failslab+0x5/0x20 [ 970.906044] kmem_cache_alloc_trace+0x55/0x320 [ 970.907056] ? _copy_from_user+0xfb/0x1b0 [ 970.907971] copy_mount_options+0x55/0x180 [ 970.908894] __x64_sys_mount+0x1a8/0x300 [ 970.909764] ? copy_mnt_ns+0xa00/0xa00 [ 970.910598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.911747] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.912843] do_syscall_64+0x33/0x40 [ 970.913649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.914755] RIP: 0033:0x7f2f885a504a [ 970.915577] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.919709] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 970.921738] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 970.923527] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 970.925133] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 970.927002] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 970.928868] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 970.930494] CPU: 0 PID: 6346 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 970.932188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.933910] Call Trace: [ 970.934462] dump_stack+0x107/0x167 [ 970.935229] should_fail.cold+0x5/0xa [ 970.936031] ? legacy_init_fs_context+0x44/0xe0 [ 970.937006] should_failslab+0x5/0x20 [ 970.937792] kmem_cache_alloc_trace+0x55/0x320 [ 970.938739] ? lockdep_init_map_type+0x2c7/0x780 [ 970.939738] legacy_init_fs_context+0x44/0xe0 [ 970.940670] ? generic_parse_monolithic+0x1f0/0x1f0 [ 970.941702] alloc_fs_context+0x4fd/0x840 [ 970.942565] path_mount+0x962/0x2120 [ 970.943356] ? strncpy_from_user+0x9e/0x470 [ 970.944252] ? finish_automount+0xa90/0xa90 [ 970.945144] ? getname_flags.part.0+0x1dd/0x4f0 [ 970.946121] __x64_sys_mount+0x282/0x300 [ 970.946973] ? copy_mnt_ns+0xa00/0xa00 [ 970.947777] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.948861] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.949932] do_syscall_64+0x33/0x40 [ 970.950714] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.951782] RIP: 0033:0x7f1dc49e504a [ 970.952554] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.956357] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 970.957937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 970.959430] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 970.960901] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 970.961507] FAULT_INJECTION: forcing a failure. [ 970.961507] name failslab, interval 1, probability 0, space 0, times 0 [ 970.962373] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 970.962384] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 970.967895] CPU: 1 PID: 6345 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 970.969334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.971083] Call Trace: [ 970.971654] dump_stack+0x107/0x167 [ 970.972433] should_fail.cold+0x5/0xa [ 970.973261] should_failslab+0x5/0x20 [ 970.974071] __kmalloc_track_caller+0x79/0x370 [ 970.975057] ? ext4_remount+0xdf/0x26e0 [ 970.975905] kstrdup+0x36/0x70 [ 970.976602] ? ext4_register_li_request+0x8e0/0x8e0 [ 970.977653] ext4_remount+0xdf/0x26e0 [ 970.978462] ? trace_hardirqs_on+0x5b/0x180 [ 970.979409] ? ext4_register_li_request+0x8e0/0x8e0 [ 970.980477] ? _cond_resched+0x12/0x80 [ 970.981291] ? shrink_dentry_list+0x134/0x500 [ 970.982203] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 970.983281] ? shrink_dcache_sb+0x1d5/0x220 [ 970.984374] ? shrink_dentry_list+0x500/0x500 [ 970.985296] ? ext4_register_li_request+0x8e0/0x8e0 [ 970.986592] legacy_reconfigure+0x11b/0x190 [ 970.987546] reconfigure_super+0x414/0x9c0 [ 970.988414] ? fs_umode_to_dtype+0xb0/0xb0 [ 970.989297] path_mount+0x1ae0/0x2120 [ 970.990280] ? strncpy_from_user+0x9e/0x470 [ 970.991226] ? finish_automount+0xa90/0xa90 [ 970.992115] ? getname_flags.part.0+0x1dd/0x4f0 [ 970.993075] __x64_sys_mount+0x282/0x300 [ 970.993904] ? copy_mnt_ns+0xa00/0xa00 [ 970.994711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.995360] FAULT_INJECTION: forcing a failure. [ 970.995360] name failslab, interval 1, probability 0, space 0, times 0 [ 970.996074] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.996100] do_syscall_64+0x33/0x40 [ 971.000356] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.001400] RIP: 0033:0x7f1a21aba04a [ 971.002223] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.005939] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.007494] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 971.008930] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.010370] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 971.011819] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.013265] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 971.014759] CPU: 0 PID: 6355 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 971.016196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.017905] Call Trace: [ 971.018579] dump_stack+0x107/0x167 [ 971.019361] should_fail.cold+0x5/0xa 15:46:26 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 8) [ 971.020161] ? create_object.isra.0+0x3a/0xa20 [ 971.021348] ? create_object.isra.0+0x3a/0xa20 [ 971.022318] should_failslab+0x5/0x20 [ 971.023134] kmem_cache_alloc+0x5b/0x310 [ 971.023994] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.024166] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.025090] create_object.isra.0+0x3a/0xa20 [ 971.025106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.025129] kmem_cache_alloc+0x159/0x310 [ 971.025153] getname_flags.part.0+0x50/0x4f0 [ 971.030503] user_path_at_empty+0xa1/0x100 [ 971.031399] __x64_sys_mount+0x1e9/0x300 [ 971.032244] ? copy_mnt_ns+0xa00/0xa00 [ 971.033060] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.034159] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.035252] do_syscall_64+0x33/0x40 [ 971.036030] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.037097] RIP: 0033:0x7fb22ff0104a [ 971.037876] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.042032] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.043943] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 971.045477] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.046979] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 971.048466] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.049956] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 971.056090] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.059631] FAULT_INJECTION: forcing a failure. [ 971.059631] name failslab, interval 1, probability 0, space 0, times 0 [ 971.062106] CPU: 0 PID: 6353 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 971.063654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.065528] Call Trace: [ 971.066114] dump_stack+0x107/0x167 [ 971.066948] should_fail.cold+0x5/0xa [ 971.067879] ? create_object.isra.0+0x3a/0xa20 [ 971.067903] FAULT_INJECTION: forcing a failure. [ 971.067903] name failslab, interval 1, probability 0, space 0, times 0 [ 971.071578] should_failslab+0x5/0x20 [ 971.072424] kmem_cache_alloc+0x5b/0x310 [ 971.073331] create_object.isra.0+0x3a/0xa20 [ 971.074332] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.075490] kmem_cache_alloc_trace+0x151/0x320 [ 971.076525] ? lockdep_init_map_type+0x2c7/0x780 [ 971.077596] legacy_init_fs_context+0x44/0xe0 [ 971.078602] ? generic_parse_monolithic+0x1f0/0x1f0 [ 971.079732] alloc_fs_context+0x4fd/0x840 [ 971.080663] path_mount+0x962/0x2120 [ 971.081501] ? strncpy_from_user+0x9e/0x470 [ 971.082473] ? finish_automount+0xa90/0xa90 [ 971.083462] ? getname_flags.part.0+0x1dd/0x4f0 [ 971.084512] __x64_sys_mount+0x282/0x300 [ 971.085424] ? copy_mnt_ns+0xa00/0xa00 [ 971.086294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.087474] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.088628] do_syscall_64+0x33/0x40 [ 971.089476] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.090632] RIP: 0033:0x7ff6a271404a [ 971.091483] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.095639] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.097340] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 971.098952] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.100566] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 971.102175] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.103778] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 971.105421] CPU: 1 PID: 6358 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 971.107236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.109262] Call Trace: [ 971.109923] dump_stack+0x107/0x167 [ 971.110817] should_fail.cold+0x5/0xa [ 971.111770] ? create_object.isra.0+0x3a/0xa20 [ 971.112898] should_failslab+0x5/0x20 [ 971.113825] kmem_cache_alloc+0x5b/0x310 [ 971.114821] create_object.isra.0+0x3a/0xa20 [ 971.115907] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.117151] kmem_cache_alloc_trace+0x151/0x320 [ 971.118301] ? _copy_from_user+0xfb/0x1b0 [ 971.119322] copy_mount_options+0x55/0x180 [ 971.120380] __x64_sys_mount+0x1a8/0x300 [ 971.121366] ? copy_mnt_ns+0xa00/0xa00 [ 971.122340] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.123650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.124934] do_syscall_64+0x33/0x40 [ 971.125881] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.127168] RIP: 0033:0x7f2f885a504a [ 971.128104] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.132751] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.134642] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 971.136432] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.137880] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 971.139344] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.140794] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:46:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x24000000, 0x0, 0x0, 0x0, 0x0) 15:46:26 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) 15:46:26 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 971.207790] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:26 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x30000000, 0x0, 0x0, 0x0, 0x0) [ 971.215985] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.226027] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.230308] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.251196] FAULT_INJECTION: forcing a failure. [ 971.251196] name failslab, interval 1, probability 0, space 0, times 0 [ 971.253632] CPU: 0 PID: 6366 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 971.255126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.256904] Call Trace: [ 971.257476] dump_stack+0x107/0x167 [ 971.258276] should_fail.cold+0x5/0xa [ 971.259114] ? create_object.isra.0+0x3a/0xa20 [ 971.260096] should_failslab+0x5/0x20 15:46:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) [ 971.260926] kmem_cache_alloc+0x5b/0x310 [ 971.261964] create_object.isra.0+0x3a/0xa20 [ 971.262921] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.264022] kmem_cache_alloc_trace+0x151/0x320 [ 971.265027] ? lockdep_init_map_type+0x2c7/0x780 [ 971.266060] legacy_init_fs_context+0x44/0xe0 [ 971.267030] ? generic_parse_monolithic+0x1f0/0x1f0 [ 971.268104] alloc_fs_context+0x4fd/0x840 [ 971.269004] path_mount+0x962/0x2120 [ 971.269829] ? strncpy_from_user+0x9e/0x470 [ 971.270764] ? finish_automount+0xa90/0xa90 [ 971.271708] ? getname_flags.part.0+0x1dd/0x4f0 [ 971.272713] __x64_sys_mount+0x282/0x300 [ 971.273596] ? copy_mnt_ns+0xa00/0xa00 [ 971.274439] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.275591] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.276699] do_syscall_64+0x33/0x40 [ 971.277499] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.278593] RIP: 0033:0x7ff67ee7d04a [ 971.279402] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.283327] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.284956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 971.286469] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.287997] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 971.289517] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.291043] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 15:46:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:46:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) 15:46:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) [ 971.330361] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) [ 971.353258] FAULT_INJECTION: forcing a failure. [ 971.353258] name failslab, interval 1, probability 0, space 0, times 0 [ 971.355653] CPU: 1 PID: 6370 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 971.357070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.358831] FAULT_INJECTION: forcing a failure. [ 971.358831] name failslab, interval 1, probability 0, space 0, times 0 [ 971.361099] Call Trace: [ 971.361126] dump_stack+0x107/0x167 [ 971.361151] should_fail.cold+0x5/0xa [ 971.363221] ? create_object.isra.0+0x3a/0xa20 [ 971.364183] should_failslab+0x5/0x20 [ 971.364977] kmem_cache_alloc+0x5b/0x310 [ 971.365824] create_object.isra.0+0x3a/0xa20 [ 971.366736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.367805] __kmalloc_track_caller+0x177/0x370 [ 971.368769] ? match_number+0xaf/0x1d0 [ 971.369586] kmemdup_nul+0x2d/0xa0 [ 971.370324] match_number+0xaf/0x1d0 [ 971.371110] ? match_u64+0x190/0x190 [ 971.371891] ? lock_acquire+0x197/0x470 [ 971.372712] ? create_object.isra.0+0x3ad/0xa20 [ 971.373684] parse_options+0x104f/0x24c0 [ 971.374539] ? clear_qf_name+0x1f0/0x1f0 [ 971.375395] ? trace_hardirqs_on+0x5b/0x180 [ 971.376299] ? __kmalloc_track_caller+0x2c6/0x370 [ 971.377303] ? ext4_remount+0xdf/0x26e0 [ 971.378128] ? memcpy+0x39/0x60 [ 971.378820] ext4_remount+0x540/0x26e0 [ 971.379660] ? ext4_register_li_request+0x8e0/0x8e0 [ 971.380698] ? _cond_resched+0x12/0x80 [ 971.381503] ? shrink_dentry_list+0x134/0x500 [ 971.382438] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 971.383522] ? shrink_dentry_list+0x500/0x500 [ 971.384469] ? ext4_register_li_request+0x8e0/0x8e0 [ 971.385509] legacy_reconfigure+0x11b/0x190 [ 971.386407] reconfigure_super+0x414/0x9c0 [ 971.387296] ? fs_umode_to_dtype+0xb0/0xb0 [ 971.388178] path_mount+0x1ae0/0x2120 [ 971.388975] ? strncpy_from_user+0x9e/0x470 [ 971.389869] ? finish_automount+0xa90/0xa90 [ 971.390766] ? getname_flags.part.0+0x1dd/0x4f0 [ 971.391754] __x64_sys_mount+0x282/0x300 [ 971.392598] ? copy_mnt_ns+0xa00/0xa00 [ 971.393412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.394501] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.395590] do_syscall_64+0x33/0x40 [ 971.396365] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.397427] RIP: 0033:0x7f1a21aba04a [ 971.398194] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.402044] RSP: 002b:00007f1a1f02dfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.403637] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21aba04a [ 971.405121] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.406622] RBP: 00007f1a1f02e040 R08: 00007f1a1f02e040 R09: 0000000020000300 [ 971.408113] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.409586] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 971.411105] CPU: 0 PID: 6373 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 971.412503] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.414195] Call Trace: [ 971.414736] dump_stack+0x107/0x167 [ 971.415492] should_fail.cold+0x5/0xa [ 971.416269] ? legacy_init_fs_context+0x44/0xe0 [ 971.417232] should_failslab+0x5/0x20 [ 971.418011] kmem_cache_alloc_trace+0x55/0x320 [ 971.418946] ? lockdep_init_map_type+0x2c7/0x780 [ 971.419909] legacy_init_fs_context+0x44/0xe0 [ 971.420807] ? generic_parse_monolithic+0x1f0/0x1f0 [ 971.421804] alloc_fs_context+0x4fd/0x840 [ 971.422634] path_mount+0x962/0x2120 [ 971.423406] ? strncpy_from_user+0x9e/0x470 [ 971.424269] ? finish_automount+0xa90/0xa90 [ 971.425130] ? getname_flags.part.0+0x1dd/0x4f0 [ 971.426076] __x64_sys_mount+0x282/0x300 [ 971.426890] ? copy_mnt_ns+0xa00/0xa00 [ 971.427686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.428739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.429772] do_syscall_64+0x33/0x40 [ 971.430515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.431561] RIP: 0033:0x7ff6a271404a [ 971.432309] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.435988] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.437524] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 971.438974] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.440389] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 971.441806] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.443234] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 971.454608] FAULT_INJECTION: forcing a failure. [ 971.454608] name failslab, interval 1, probability 0, space 0, times 0 [ 971.456874] CPU: 0 PID: 6378 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 971.458235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 971.459896] Call Trace: [ 971.460418] dump_stack+0x107/0x167 [ 971.461136] should_fail.cold+0x5/0xa [ 971.461898] ? create_object.isra.0+0x3a/0xa20 [ 971.462801] should_failslab+0x5/0x20 [ 971.463550] kmem_cache_alloc+0x5b/0x310 [ 971.464354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.465400] create_object.isra.0+0x3a/0xa20 [ 971.466255] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 971.467270] kmem_cache_alloc+0x159/0x310 [ 971.468088] getname_flags.part.0+0x50/0x4f0 [ 971.468956] user_path_at_empty+0xa1/0x100 [ 971.469778] __x64_sys_mount+0x1e9/0x300 [ 971.470567] ? copy_mnt_ns+0xa00/0xa00 [ 971.471342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 971.472362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 971.473378] do_syscall_64+0x33/0x40 [ 971.474102] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 971.475122] RIP: 0033:0x7fb22ff0104a [ 971.475855] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 971.479445] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 971.480932] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 971.482337] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 971.483750] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 971.485126] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 971.486509] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 971.501846] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.504140] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 971.506077] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 9) 15:46:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) 15:46:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) 15:46:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:46:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) 15:46:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 15:46:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) 15:46:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) [ 985.109852] FAULT_INJECTION: forcing a failure. [ 985.109852] name failslab, interval 1, probability 0, space 0, times 0 [ 985.112341] CPU: 0 PID: 6391 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 985.113779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.115523] Call Trace: [ 985.116077] dump_stack+0x107/0x167 [ 985.116849] should_fail.cold+0x5/0xa [ 985.117675] ? create_object.isra.0+0x3a/0xa20 [ 985.118635] should_failslab+0x5/0x20 [ 985.119445] kmem_cache_alloc+0x5b/0x310 [ 985.120321] create_object.isra.0+0x3a/0xa20 [ 985.120577] FAULT_INJECTION: forcing a failure. [ 985.120577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 985.121244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.121271] __kmalloc_track_caller+0x177/0x370 [ 985.121301] ? ext4_remount+0xdf/0x26e0 [ 985.127060] kstrdup+0x36/0x70 [ 985.127762] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.128804] ext4_remount+0xdf/0x26e0 [ 985.129613] ? trace_hardirqs_on+0x5b/0x180 [ 985.130550] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.131614] ? _cond_resched+0x12/0x80 [ 985.132433] ? shrink_dentry_list+0x134/0x500 [ 985.133378] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 985.134460] ? shrink_dcache_sb+0x1d5/0x220 [ 985.135422] ? shrink_dentry_list+0x500/0x500 [ 985.136388] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.137439] legacy_reconfigure+0x11b/0x190 [ 985.138353] reconfigure_super+0x414/0x9c0 [ 985.139238] ? fs_umode_to_dtype+0xb0/0xb0 [ 985.140132] path_mount+0x1ae0/0x2120 [ 985.140945] ? strncpy_from_user+0x9e/0x470 [ 985.141864] ? finish_automount+0xa90/0xa90 [ 985.142778] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.143786] __x64_sys_mount+0x282/0x300 [ 985.144633] ? copy_mnt_ns+0xa00/0xa00 [ 985.145454] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.146559] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.147674] do_syscall_64+0x33/0x40 [ 985.148462] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.149545] RIP: 0033:0x7ff6a271404a [ 985.150335] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.154219] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.155857] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 985.157353] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.158859] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 985.160374] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.161857] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 985.163400] CPU: 1 PID: 6399 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 985.164833] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.166565] Call Trace: [ 985.167120] dump_stack+0x107/0x167 [ 985.167889] should_fail.cold+0x5/0xa [ 985.168691] _copy_from_user+0x2e/0x1b0 [ 985.169532] copy_mount_options+0x76/0x180 [ 985.170418] __x64_sys_mount+0x1a8/0x300 [ 985.170894] FAULT_INJECTION: forcing a failure. [ 985.170894] name failslab, interval 1, probability 0, space 0, times 0 [ 985.171264] ? copy_mnt_ns+0xa00/0xa00 [ 985.174388] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.175489] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.176561] do_syscall_64+0x33/0x40 [ 985.177339] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.178403] RIP: 0033:0x7f2f885a504a [ 985.179173] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.183015] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.184600] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 985.186083] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.187585] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 985.189067] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.190558] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 985.192073] CPU: 0 PID: 6394 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 985.193516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.195255] Call Trace: [ 985.195828] dump_stack+0x107/0x167 [ 985.196597] should_fail.cold+0x5/0xa [ 985.197410] ? alloc_fs_context+0x57/0x840 [ 985.198290] should_failslab+0x5/0x20 [ 985.198583] EXT4-fs: 2 callbacks suppressed [ 985.198597] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.199089] kmem_cache_alloc_trace+0x55/0x320 [ 985.199107] ? cap_capable+0x1cd/0x230 [ 985.199122] ? cap_capable+0x1cd/0x230 [ 985.199149] alloc_fs_context+0x57/0x840 [ 985.200226] FAULT_INJECTION: forcing a failure. [ 985.200226] name failslab, interval 1, probability 0, space 0, times 0 [ 985.201733] path_mount+0x962/0x2120 [ 985.201755] ? strncpy_from_user+0x9e/0x470 [ 985.201773] ? finish_automount+0xa90/0xa90 [ 985.201795] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.210932] __x64_sys_mount+0x282/0x300 [ 985.211790] ? copy_mnt_ns+0xa00/0xa00 [ 985.212611] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.213704] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.214795] do_syscall_64+0x33/0x40 [ 985.215589] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.216659] RIP: 0033:0x7fb22ff0104a [ 985.217444] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.221312] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.222903] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 985.224401] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.225886] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 985.227383] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.228885] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 985.230398] CPU: 1 PID: 6392 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 985.231852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.233128] FAULT_INJECTION: forcing a failure. [ 985.233128] name failslab, interval 1, probability 0, space 0, times 0 [ 985.233572] Call Trace: [ 985.233593] dump_stack+0x107/0x167 [ 985.233616] should_fail.cold+0x5/0xa [ 985.238842] ? create_object.isra.0+0x3a/0xa20 [ 985.239970] should_failslab+0x5/0x20 [ 985.240881] kmem_cache_alloc+0x5b/0x310 [ 985.241865] create_object.isra.0+0x3a/0xa20 [ 985.242822] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.243913] __kmalloc_track_caller+0x177/0x370 [ 985.244920] ? ext4_remount+0xdf/0x26e0 [ 985.245776] kstrdup+0x36/0x70 [ 985.246446] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.247490] ext4_remount+0xdf/0x26e0 [ 985.248287] ? shrink_dentry_list+0x28d/0x500 [ 985.249221] ? lock_downgrade+0x6d0/0x6d0 [ 985.250083] ? lock_downgrade+0x6d0/0x6d0 [ 985.250941] ? do_raw_spin_lock+0x121/0x260 [ 985.251861] ? rwlock_bug.part.0+0x90/0x90 [ 985.252770] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.253842] ? do_raw_spin_unlock+0x4f/0x220 [ 985.254789] ? _raw_spin_unlock+0x1a/0x30 [ 985.255688] ? shrink_dentry_list+0x134/0x500 [ 985.256653] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 985.257766] ? shrink_dcache_sb+0x1d5/0x220 [ 985.258692] ? shrink_dentry_list+0x500/0x500 [ 985.259678] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.260756] legacy_reconfigure+0x11b/0x190 [ 985.261688] reconfigure_super+0x414/0x9c0 [ 985.262599] ? fs_umode_to_dtype+0xb0/0xb0 [ 985.263521] path_mount+0x1ae0/0x2120 [ 985.264348] ? strncpy_from_user+0x9e/0x470 [ 985.265275] ? finish_automount+0xa90/0xa90 [ 985.266204] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.267213] __x64_sys_mount+0x282/0x300 [ 985.268102] ? copy_mnt_ns+0xa00/0xa00 [ 985.268944] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.270074] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.271187] do_syscall_64+0x33/0x40 [ 985.271995] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.273101] RIP: 0033:0x7ff67ee7d04a [ 985.273905] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.277735] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.279378] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 985.280911] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.282445] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 985.283986] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.285518] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 985.287081] CPU: 0 PID: 6397 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 985.288594] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.290381] Call Trace: [ 985.290959] dump_stack+0x107/0x167 [ 985.291770] should_fail.cold+0x5/0xa [ 985.292594] ? create_object.isra.0+0x3a/0xa20 [ 985.293323] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.293584] should_failslab+0x5/0x20 [ 985.293605] kmem_cache_alloc+0x5b/0x310 [ 985.293630] create_object.isra.0+0x3a/0xa20 [ 985.295591] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.296178] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.296204] kmem_cache_alloc_trace+0x151/0x320 [ 985.296231] ? lockdep_init_map_type+0x2c7/0x780 [ 985.297225] FAULT_INJECTION: forcing a failure. [ 985.297225] name failslab, interval 1, probability 0, space 0, times 0 [ 985.298043] legacy_init_fs_context+0x44/0xe0 [ 985.298069] ? generic_parse_monolithic+0x1f0/0x1f0 [ 985.307217] alloc_fs_context+0x4fd/0x840 [ 985.308129] path_mount+0x962/0x2120 [ 985.308939] ? strncpy_from_user+0x9e/0x470 [ 985.309868] ? finish_automount+0xa90/0xa90 [ 985.310801] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.311827] __x64_sys_mount+0x282/0x300 [ 985.312701] ? copy_mnt_ns+0xa00/0xa00 [ 985.313545] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.314678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.315807] do_syscall_64+0x33/0x40 [ 985.316612] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.317721] RIP: 0033:0x7f1dc49e504a [ 985.318524] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.322505] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.324159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 985.325699] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.327240] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 985.328798] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.330339] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 985.331924] CPU: 1 PID: 6398 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 985.332628] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.333423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.333430] Call Trace: [ 985.333453] dump_stack+0x107/0x167 [ 985.333476] should_fail.cold+0x5/0xa [ 985.339178] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.339254] ? getname_flags.part.0+0x50/0x4f0 [ 985.342011] should_failslab+0x5/0x20 [ 985.342838] kmem_cache_alloc+0x5b/0x310 [ 985.343758] getname_flags.part.0+0x50/0x4f0 [ 985.344711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.345870] getname+0x8e/0xd0 [ 985.346567] do_sys_openat2+0xf9/0x4d0 [ 985.347442] ? __kasan_slab_free+0x122/0x160 [ 985.348388] ? build_open_flags+0x6f0/0x6f0 [ 985.349364] ? __x64_sys_mount+0x227/0x300 [ 985.350274] ? kfree+0xd7/0x340 [ 985.351000] __x64_sys_openat+0x13f/0x1f0 [ 985.351915] ? __ia32_sys_open+0x1c0/0x1c0 [ 985.352842] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.353978] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.355096] do_syscall_64+0x33/0x40 [ 985.355912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.357019] RIP: 0033:0x7f1a21a6ba04 [ 985.357829] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 985.361867] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 15:46:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x55050000, 0x0, 0x0, 0x0, 0x0) [ 985.363522] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 985.365324] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 985.366865] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 985.368451] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 985.370012] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 985.371923] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:46:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 10) 15:46:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:46:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) 15:46:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) 15:46:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) [ 985.483387] FAULT_INJECTION: forcing a failure. [ 985.483387] name failslab, interval 1, probability 0, space 0, times 0 [ 985.485949] CPU: 1 PID: 6405 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 985.487433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.489228] Call Trace: [ 985.489801] dump_stack+0x107/0x167 [ 985.490589] should_fail.cold+0x5/0xa [ 985.491424] ? getname_flags.part.0+0x50/0x4f0 [ 985.492416] should_failslab+0x5/0x20 [ 985.493242] kmem_cache_alloc+0x5b/0x310 [ 985.494125] getname_flags.part.0+0x50/0x4f0 [ 985.495081] user_path_at_empty+0xa1/0x100 [ 985.496007] __x64_sys_mount+0x1e9/0x300 [ 985.496881] ? copy_mnt_ns+0xa00/0xa00 [ 985.497729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.498866] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.499990] do_syscall_64+0x33/0x40 [ 985.500796] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.501907] RIP: 0033:0x7f2f885a504a [ 985.502713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.506713] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.508374] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 985.509040] FAULT_INJECTION: forcing a failure. [ 985.509040] name failslab, interval 1, probability 0, space 0, times 0 [ 985.509918] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.509930] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 985.509949] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.516903] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 985.518477] CPU: 0 PID: 6409 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 985.519972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.521764] Call Trace: [ 985.522339] dump_stack+0x107/0x167 [ 985.523128] should_fail.cold+0x5/0xa [ 985.523966] should_failslab+0x5/0x20 [ 985.524788] __kmalloc_track_caller+0x79/0x370 [ 985.525773] ? ext4_remount+0xdf/0x26e0 [ 985.526642] kstrdup+0x36/0x70 [ 985.527343] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.528420] ext4_remount+0xdf/0x26e0 [ 985.529245] ? trace_hardirqs_on+0x5b/0x180 [ 985.530192] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.531276] ? _cond_resched+0x12/0x80 [ 985.532126] ? shrink_dentry_list+0x134/0x500 [ 985.533095] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 985.534208] ? shrink_dcache_sb+0x1d5/0x220 [ 985.535139] ? shrink_dentry_list+0x500/0x500 [ 985.536127] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.537207] legacy_reconfigure+0x11b/0x190 [ 985.538136] reconfigure_super+0x414/0x9c0 [ 985.539051] ? fs_umode_to_dtype+0xb0/0xb0 [ 985.539974] path_mount+0x1ae0/0x2120 [ 985.540800] ? strncpy_from_user+0x9e/0x470 [ 985.541732] ? finish_automount+0xa90/0xa90 [ 985.542658] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.543675] __x64_sys_mount+0x282/0x300 [ 985.544548] ? copy_mnt_ns+0xa00/0xa00 [ 985.545392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.546527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.547654] do_syscall_64+0x33/0x40 [ 985.548460] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.549566] RIP: 0033:0x7ff67ee7d04a [ 985.550368] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.554360] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.556011] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 985.557551] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.559094] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 985.560643] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.562180] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 15:46:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) [ 985.564182] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.567913] FAULT_INJECTION: forcing a failure. [ 985.567913] name failslab, interval 1, probability 0, space 0, times 0 [ 985.570351] CPU: 1 PID: 6413 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 985.571840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.573632] Call Trace: [ 985.574343] dump_stack+0x107/0x167 [ 985.575186] should_fail.cold+0x5/0xa [ 985.576068] ? create_object.isra.0+0x3a/0xa20 [ 985.577248] should_failslab+0x5/0x20 [ 985.578211] kmem_cache_alloc+0x5b/0x310 [ 985.579276] create_object.isra.0+0x3a/0xa20 [ 985.580362] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.581620] __kmalloc_track_caller+0x177/0x370 [ 985.582727] ? ext4_remount+0xdf/0x26e0 [ 985.583688] kstrdup+0x36/0x70 [ 985.584455] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.585616] ext4_remount+0xdf/0x26e0 [ 985.586420] ? trace_hardirqs_on+0x5b/0x180 [ 985.587341] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.588407] ? _cond_resched+0x12/0x80 [ 985.589225] ? shrink_dentry_list+0x134/0x500 [ 985.590170] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 985.591245] ? shrink_dcache_sb+0x1d5/0x220 [ 985.592162] ? shrink_dentry_list+0x500/0x500 [ 985.593114] ? ext4_register_li_request+0x8e0/0x8e0 [ 985.594171] legacy_reconfigure+0x11b/0x190 [ 985.595080] reconfigure_super+0x414/0x9c0 [ 985.596111] ? fs_umode_to_dtype+0xb0/0xb0 [ 985.597240] path_mount+0x1ae0/0x2120 [ 985.598739] ? strncpy_from_user+0x9e/0x470 [ 985.599783] ? finish_automount+0xa90/0xa90 [ 985.600746] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.601790] __x64_sys_mount+0x282/0x300 [ 985.602753] ? copy_mnt_ns+0xa00/0xa00 15:46:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x64000000, 0x0, 0x0, 0x0, 0x0) [ 985.603682] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.605212] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.606460] do_syscall_64+0x33/0x40 [ 985.607273] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.608380] RIP: 0033:0x7ff6a271404a [ 985.609138] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.613499] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.615438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 985.617238] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 985.618976] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 985.620667] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 985.622229] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 985.659603] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.662250] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.664245] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 985.668450] FAULT_INJECTION: forcing a failure. [ 985.668450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 985.671662] CPU: 1 PID: 6417 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 985.673172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.675068] Call Trace: [ 985.675752] dump_stack+0x107/0x167 [ 985.676687] should_fail.cold+0x5/0xa [ 985.677632] __alloc_pages_nodemask+0x182/0x600 [ 985.678773] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 985.680427] ? kmem_cache_alloc+0x301/0x310 [ 985.681511] alloc_pages_current+0x187/0x280 [ 985.682615] allocate_slab+0x26f/0x380 [ 985.683630] ___slab_alloc+0x470/0x700 [ 985.684621] ? getname_flags.part.0+0x50/0x4f0 [ 985.685782] ? getname_flags.part.0+0x50/0x4f0 [ 985.686935] ? kmem_cache_alloc+0x301/0x310 [ 985.688035] kmem_cache_alloc+0x301/0x310 [ 985.689084] getname_flags.part.0+0x50/0x4f0 [ 985.690186] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.691279] getname+0x8e/0xd0 [ 985.691973] do_sys_openat2+0xf9/0x4d0 [ 985.692959] ? __kasan_slab_free+0x122/0x160 [ 985.694064] ? build_open_flags+0x6f0/0x6f0 [ 985.695171] ? __x64_sys_mount+0x227/0x300 [ 985.696282] ? kfree+0xd7/0x340 [ 985.697179] __x64_sys_openat+0x13f/0x1f0 [ 985.698268] ? __ia32_sys_open+0x1c0/0x1c0 [ 985.699515] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.700881] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.702220] do_syscall_64+0x33/0x40 [ 985.703189] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 985.704525] RIP: 0033:0x7f1a21a6ba04 [ 985.705501] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 985.710286] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 985.712263] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 985.714171] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 985.716046] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 985.717891] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 985.719755] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 15:46:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:46:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) [ 997.790625] FAULT_INJECTION: forcing a failure. [ 997.790625] name failslab, interval 1, probability 0, space 0, times 0 [ 997.791963] CPU: 0 PID: 6426 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 997.792720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.793635] Call Trace: [ 997.793929] dump_stack+0x107/0x167 [ 997.794335] should_fail.cold+0x5/0xa [ 997.794757] should_failslab+0x5/0x20 [ 997.795182] __kmalloc_track_caller+0x79/0x370 [ 997.795689] ? ext4_remount+0xdf/0x26e0 [ 997.795869] FAULT_INJECTION: forcing a failure. [ 997.795869] name failslab, interval 1, probability 0, space 0, times 0 [ 997.796159] kstrdup+0x36/0x70 [ 997.798839] ? ext4_register_li_request+0x8e0/0x8e0 [ 997.799396] ext4_remount+0xdf/0x26e0 [ 997.799824] ? trace_hardirqs_on+0x5b/0x180 [ 997.800309] ? ext4_register_li_request+0x8e0/0x8e0 [ 997.800863] ? _cond_resched+0x12/0x80 [ 997.801293] ? shrink_dentry_list+0x134/0x500 [ 997.801787] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 997.802353] ? shrink_dcache_sb+0x1d5/0x220 [ 997.802826] ? shrink_dentry_list+0x500/0x500 [ 997.803322] ? ext4_register_li_request+0x8e0/0x8e0 [ 997.803888] legacy_reconfigure+0x11b/0x190 [ 997.804365] reconfigure_super+0x414/0x9c0 [ 997.804830] ? fs_umode_to_dtype+0xb0/0xb0 [ 997.805298] path_mount+0x1ae0/0x2120 [ 997.805727] ? strncpy_from_user+0x9e/0x470 [ 997.806208] ? finish_automount+0xa90/0xa90 [ 997.806678] ? getname_flags.part.0+0x1dd/0x4f0 [ 997.807191] __x64_sys_mount+0x282/0x300 [ 997.807635] ? copy_mnt_ns+0xa00/0xa00 [ 997.808081] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 997.808667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 997.809235] do_syscall_64+0x33/0x40 [ 997.809645] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 997.810206] RIP: 0033:0x7f1dc49e504a [ 997.810615] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.812655] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 997.813484] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 997.814273] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 997.815051] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 997.815840] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 997.816623] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 997.817437] CPU: 1 PID: 6430 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 997.819006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.820720] Call Trace: [ 997.821265] dump_stack+0x107/0x167 [ 997.822011] should_fail.cold+0x5/0xa [ 997.822792] ? create_object.isra.0+0x3a/0xa20 [ 997.823727] should_failslab+0x5/0x20 [ 997.824522] kmem_cache_alloc+0x5b/0x310 [ 997.825352] create_object.isra.0+0x3a/0xa20 [ 997.826246] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 15:46:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) 15:46:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) 15:46:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 11) 15:46:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7e000000, 0x0, 0x0, 0x0, 0x0) 15:46:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) 15:46:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 997.827296] kmem_cache_alloc_trace+0x151/0x320 [ 997.828387] ? cap_capable+0x1cd/0x230 [ 997.829188] alloc_fs_context+0x57/0x840 [ 997.830214] path_mount+0x962/0x2120 [ 997.831058] ? strncpy_from_user+0x9e/0x470 [ 997.831953] ? finish_automount+0xa90/0xa90 [ 997.832851] ? getname_flags.part.0+0x1dd/0x4f0 [ 997.833807] __x64_sys_mount+0x282/0x300 [ 997.834653] ? copy_mnt_ns+0xa00/0xa00 [ 997.835464] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 997.836551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 997.837615] do_syscall_64+0x33/0x40 [ 997.838382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 997.839431] RIP: 0033:0x7fb22ff0104a [ 997.840208] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.843974] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 997.845524] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 997.846980] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 997.848456] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 997.849928] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 15:46:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) [ 997.851385] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 997.864064] EXT4-fs: 1 callbacks suppressed [ 997.864083] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 997.867589] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 997.882932] FAULT_INJECTION: forcing a failure. [ 997.882932] name failslab, interval 1, probability 0, space 0, times 0 [ 997.885689] CPU: 1 PID: 6432 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 997.887387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.889450] Call Trace: [ 997.890111] dump_stack+0x107/0x167 [ 997.891021] should_fail.cold+0x5/0xa [ 997.891985] ? create_object.isra.0+0x3a/0xa20 [ 997.893070] should_failslab+0x5/0x20 [ 997.893983] kmem_cache_alloc+0x5b/0x310 [ 997.894947] create_object.isra.0+0x3a/0xa20 [ 997.895990] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 997.897194] __kmalloc_track_caller+0x177/0x370 [ 997.898318] ? match_number+0xaf/0x1d0 [ 997.899315] kmemdup_nul+0x2d/0xa0 [ 997.900240] match_number+0xaf/0x1d0 [ 997.901195] ? match_u64+0x190/0x190 [ 997.902163] ? lock_acquire+0x197/0x470 [ 997.903165] ? create_object.isra.0+0x3ad/0xa20 [ 997.904399] parse_options+0x104f/0x24c0 [ 997.905452] ? clear_qf_name+0x1f0/0x1f0 [ 997.906496] ? trace_hardirqs_on+0x5b/0x180 [ 997.907590] ? __kmalloc_track_caller+0x2c6/0x370 [ 997.908843] ? ext4_remount+0xdf/0x26e0 [ 997.909857] ? memcpy+0x39/0x60 [ 997.910724] ext4_remount+0x540/0x26e0 [ 997.911759] ? ext4_register_li_request+0x8e0/0x8e0 [ 997.913036] ? do_raw_spin_unlock+0x4f/0x220 [ 997.914140] ? _raw_spin_unlock+0x1a/0x30 [ 997.915180] ? shrink_dentry_list+0x134/0x500 [ 997.916320] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 997.917652] ? shrink_dentry_list+0x500/0x500 [ 997.918827] ? ext4_register_li_request+0x8e0/0x8e0 [ 997.920144] legacy_reconfigure+0x11b/0x190 [ 997.920779] FAULT_INJECTION: forcing a failure. [ 997.920779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 997.921260] reconfigure_super+0x414/0x9c0 [ 997.923668] ? fs_umode_to_dtype+0xb0/0xb0 [ 997.924766] path_mount+0x1ae0/0x2120 [ 997.925746] ? strncpy_from_user+0x9e/0x470 [ 997.926839] ? finish_automount+0xa90/0xa90 [ 997.927950] ? getname_flags.part.0+0x1dd/0x4f0 [ 997.929154] __x64_sys_mount+0x282/0x300 [ 997.930199] ? copy_mnt_ns+0xa00/0xa00 [ 997.931189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 997.932530] ? syscall_enter_from_user_mode+0x1d/0x50 [ 997.933846] do_syscall_64+0x33/0x40 [ 997.934819] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 997.936136] RIP: 0033:0x7ff67ee7d04a [ 997.937082] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 997.941778] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 997.943728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 997.945559] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 997.947389] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 997.949217] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 997.951037] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 997.952891] CPU: 0 PID: 6429 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 997.953688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.954780] Call Trace: [ 997.955172] dump_stack+0x107/0x167 [ 997.955681] should_fail.cold+0x5/0xa [ 997.956282] strncpy_from_user+0x34/0x470 [ 997.956866] getname_flags.part.0+0x95/0x4f0 [ 997.957456] getname+0x8e/0xd0 [ 997.957921] do_sys_openat2+0xf9/0x4d0 [ 997.958436] ? finish_task_switch+0xef/0x5d0 [ 997.959053] ? __switch_to+0x572/0xf70 [ 997.960287] ? __switch_to_asm+0x3a/0x60 [ 997.961311] ? build_open_flags+0x6f0/0x6f0 [ 997.962389] ? __schedule+0x82c/0x1ea0 [ 997.963372] __x64_sys_openat+0x13f/0x1f0 [ 997.964177] ? __ia32_sys_open+0x1c0/0x1c0 [ 997.964701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 997.965356] ? syscall_enter_from_user_mode+0x1d/0x50 [ 997.966101] do_syscall_64+0x33/0x40 [ 997.966570] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 997.967213] RIP: 0033:0x7f1a21a6ba04 [ 997.967692] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 997.973141] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 997.974683] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 997.975582] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 997.976488] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 997.977389] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 997.978285] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 997.984984] FAULT_INJECTION: forcing a failure. [ 997.984984] name failslab, interval 1, probability 0, space 0, times 0 [ 997.988146] CPU: 1 PID: 6443 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 997.989834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 997.991884] Call Trace: [ 997.992540] dump_stack+0x107/0x167 [ 997.993468] should_fail.cold+0x5/0xa [ 997.994413] ? create_object.isra.0+0x3a/0xa20 [ 997.995547] should_failslab+0x5/0x20 [ 997.996504] kmem_cache_alloc+0x5b/0x310 [ 997.997512] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 997.998809] create_object.isra.0+0x3a/0xa20 [ 997.999903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.001164] kmem_cache_alloc+0x159/0x310 [ 998.002196] getname_flags.part.0+0x50/0x4f0 [ 998.003289] user_path_at_empty+0xa1/0x100 [ 998.004364] __x64_sys_mount+0x1e9/0x300 [ 998.005377] ? copy_mnt_ns+0xa00/0xa00 [ 998.006362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.007671] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.008830] do_syscall_64+0x33/0x40 [ 998.009576] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.010608] RIP: 0033:0x7f2f885a504a 15:46:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 998.011350] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.015282] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.016868] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 998.018335] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.019794] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 998.021266] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.022734] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:46:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x80040000, 0x0, 0x0, 0x0, 0x0) 15:46:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) [ 998.049431] FAULT_INJECTION: forcing a failure. [ 998.049431] name failslab, interval 1, probability 0, space 0, times 0 [ 998.050733] CPU: 0 PID: 6445 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 998.051481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.052409] Call Trace: [ 998.052703] dump_stack+0x107/0x167 [ 998.053104] should_fail.cold+0x5/0xa [ 998.053528] ? legacy_init_fs_context+0x44/0xe0 [ 998.054047] should_failslab+0x5/0x20 [ 998.054467] kmem_cache_alloc_trace+0x55/0x320 [ 998.054969] ? lockdep_init_map_type+0x2c7/0x780 [ 998.055492] legacy_init_fs_context+0x44/0xe0 [ 998.055979] ? generic_parse_monolithic+0x1f0/0x1f0 [ 998.056528] alloc_fs_context+0x4fd/0x840 [ 998.056972] path_mount+0x962/0x2120 [ 998.057387] ? strncpy_from_user+0x9e/0x470 [ 998.057845] ? finish_automount+0xa90/0xa90 [ 998.058320] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.058820] __x64_sys_mount+0x282/0x300 [ 998.059274] ? copy_mnt_ns+0xa00/0xa00 [ 998.059690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.060275] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.060845] do_syscall_64+0x33/0x40 [ 998.061242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.061810] RIP: 0033:0x7fb22ff0104a [ 998.062208] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.064243] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.064624] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.065056] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 998.065062] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.065068] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 998.065074] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.065080] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 998.076013] FAULT_INJECTION: forcing a failure. [ 998.076013] name failslab, interval 1, probability 0, space 0, times 0 [ 998.077433] CPU: 0 PID: 6437 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 998.078229] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.079194] Call Trace: [ 998.079517] dump_stack+0x107/0x167 [ 998.079969] should_fail.cold+0x5/0xa [ 998.080424] ? create_object.isra.0+0x3a/0xa20 [ 998.080955] should_failslab+0x5/0x20 [ 998.081401] kmem_cache_alloc+0x5b/0x310 [ 998.081873] create_object.isra.0+0x3a/0xa20 [ 998.082394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.083035] __kmalloc_track_caller+0x177/0x370 [ 998.083639] ? match_number+0xaf/0x1d0 [ 998.084155] kmemdup_nul+0x2d/0xa0 [ 998.084728] match_number+0xaf/0x1d0 [ 998.085209] ? match_u64+0x190/0x190 [ 998.085699] ? create_object.isra.0+0x3ad/0xa20 [ 998.086298] parse_options+0x104f/0x24c0 [ 998.086839] ? clear_qf_name+0x1f0/0x1f0 [ 998.087364] ? trace_hardirqs_on+0x5b/0x180 [ 998.087930] ? __kmalloc_track_caller+0x2c6/0x370 [ 998.088538] ? ext4_remount+0xdf/0x26e0 [ 998.089044] ? memcpy+0x39/0x60 [ 998.089487] ext4_remount+0x540/0x26e0 [ 998.090012] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.090679] ? _cond_resched+0x12/0x80 [ 998.091194] ? shrink_dentry_list+0x134/0x500 [ 998.091760] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 998.092441] ? shrink_dentry_list+0x500/0x500 [ 998.093003] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.093676] legacy_reconfigure+0x11b/0x190 [ 998.094187] reconfigure_super+0x414/0x9c0 [ 998.094737] ? fs_umode_to_dtype+0xb0/0xb0 [ 998.095260] path_mount+0x1ae0/0x2120 [ 998.095707] ? strncpy_from_user+0x9e/0x470 [ 998.096242] ? finish_automount+0xa90/0xa90 [ 998.096727] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.097239] __x64_sys_mount+0x282/0x300 [ 998.097692] ? copy_mnt_ns+0xa00/0xa00 [ 998.098138] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.098727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.099300] do_syscall_64+0x33/0x40 [ 998.099695] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.100253] RIP: 0033:0x7ff6a271404a [ 998.100675] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.102618] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.103455] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 998.104247] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.105029] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 998.105810] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.106593] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:46:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) 15:46:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x81020000, 0x0, 0x0, 0x0, 0x0) [ 998.145981] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.147073] FAULT_INJECTION: forcing a failure. [ 998.147073] name failslab, interval 1, probability 0, space 0, times 0 [ 998.148504] CPU: 0 PID: 6439 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 998.149255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.150159] Call Trace: [ 998.150451] dump_stack+0x107/0x167 [ 998.150850] should_fail.cold+0x5/0xa [ 998.151273] ? create_object.isra.0+0x3a/0xa20 [ 998.151772] should_failslab+0x5/0x20 [ 998.152202] kmem_cache_alloc+0x5b/0x310 [ 998.152647] create_object.isra.0+0x3a/0xa20 [ 998.153125] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.153668] __kmalloc_track_caller+0x177/0x370 [ 998.154167] ? ext4_remount+0xdf/0x26e0 [ 998.154604] kstrdup+0x36/0x70 [ 998.154947] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.155490] ext4_remount+0xdf/0x26e0 [ 998.155905] ? trace_hardirqs_on+0x5b/0x180 [ 998.156385] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.156913] ? _cond_resched+0x12/0x80 [ 998.157337] ? shrink_dentry_list+0x134/0x500 [ 998.157813] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 998.158377] ? shrink_dcache_sb+0x1d5/0x220 [ 998.158834] ? shrink_dentry_list+0x500/0x500 [ 998.159328] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.159865] legacy_reconfigure+0x11b/0x190 [ 998.160336] reconfigure_super+0x414/0x9c0 [ 998.160785] ? fs_umode_to_dtype+0xb0/0xb0 [ 998.161249] path_mount+0x1ae0/0x2120 [ 998.161655] ? strncpy_from_user+0x9e/0x470 [ 998.162126] ? finish_automount+0xa90/0xa90 [ 998.162584] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.163104] __x64_sys_mount+0x282/0x300 [ 998.163534] ? copy_mnt_ns+0xa00/0xa00 [ 998.163968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.164532] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.165078] do_syscall_64+0x33/0x40 [ 998.165486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.166029] RIP: 0033:0x7f1dc49e504a [ 998.166437] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.168397] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.169229] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 998.170007] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.170785] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 998.171564] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.172358] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:46:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) [ 998.207320] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.208616] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.210697] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.213960] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.215915] FAULT_INJECTION: forcing a failure. [ 998.215915] name failslab, interval 1, probability 0, space 0, times 0 [ 998.220581] CPU: 1 PID: 6449 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 998.222040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.223802] Call Trace: [ 998.224378] dump_stack+0x107/0x167 [ 998.225155] should_fail.cold+0x5/0xa [ 998.225968] ? __alloc_file+0x21/0x320 [ 998.226795] should_failslab+0x5/0x20 [ 998.227606] kmem_cache_alloc+0x5b/0x310 [ 998.228480] __alloc_file+0x21/0x320 [ 998.229268] alloc_empty_file+0x6d/0x170 [ 998.230122] path_openat+0xe6/0x2770 [ 998.230914] ? __lock_acquire+0x1657/0x5b00 [ 998.231842] ? path_lookupat+0x860/0x860 [ 998.232702] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 998.233792] ? lock_acquire+0x197/0x470 [ 998.234632] ? find_held_lock+0x2c/0x110 [ 998.235527] do_filp_open+0x190/0x3e0 [ 998.236340] ? may_open_dev+0xf0/0xf0 [ 998.237151] ? alloc_fd+0x2e7/0x670 [ 998.237917] ? lock_downgrade+0x6d0/0x6d0 [ 998.238791] ? do_raw_spin_lock+0x121/0x260 [ 998.239699] ? rwlock_bug.part.0+0x90/0x90 [ 998.240612] ? _raw_spin_unlock+0x1a/0x30 [ 998.241585] ? alloc_fd+0x2e7/0x670 [ 998.242396] do_sys_openat2+0x171/0x4d0 [ 998.243238] ? __kasan_slab_free+0x122/0x160 [ 998.244183] ? build_open_flags+0x6f0/0x6f0 [ 998.245092] ? __x64_sys_mount+0x227/0x300 [ 998.245986] ? kfree+0xd7/0x340 [ 998.246688] __x64_sys_openat+0x13f/0x1f0 [ 998.247569] ? __ia32_sys_open+0x1c0/0x1c0 [ 998.248472] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.249580] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.250659] do_syscall_64+0x33/0x40 [ 998.251445] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.252526] RIP: 0033:0x7f1a21a6ba04 [ 998.253311] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 998.257154] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 998.258757] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 998.260275] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 998.261776] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 998.263280] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 998.264808] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 998.268772] FAULT_INJECTION: forcing a failure. [ 998.268772] name failslab, interval 1, probability 0, space 0, times 0 [ 998.271220] CPU: 1 PID: 6451 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 998.272671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.274419] Call Trace: [ 998.274976] dump_stack+0x107/0x167 [ 998.275748] should_fail.cold+0x5/0xa [ 998.276566] should_failslab+0x5/0x20 [ 998.277376] __kmalloc_track_caller+0x79/0x370 [ 998.278136] FAULT_INJECTION: forcing a failure. [ 998.278136] name failslab, interval 1, probability 0, space 0, times 0 [ 998.278353] ? match_number+0xaf/0x1d0 [ 998.280396] kmemdup_nul+0x2d/0xa0 [ 998.281149] match_number+0xaf/0x1d0 [ 998.281934] ? match_u64+0x190/0x190 [ 998.282724] ? lock_acquire+0x197/0x470 [ 998.283559] ? create_object.isra.0+0x3ad/0xa20 [ 998.284556] parse_options+0x104f/0x24c0 [ 998.285434] ? clear_qf_name+0x1f0/0x1f0 [ 998.286294] ? trace_hardirqs_on+0x5b/0x180 [ 998.287207] ? __kmalloc_track_caller+0x2c6/0x370 [ 998.288227] ? ext4_remount+0xdf/0x26e0 [ 998.289068] ? memcpy+0x39/0x60 [ 998.289763] ext4_remount+0x540/0x26e0 [ 998.290611] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.291650] ? _cond_resched+0x12/0x80 [ 998.292477] ? shrink_dentry_list+0x134/0x500 [ 998.293413] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 998.294503] ? shrink_dentry_list+0x500/0x500 [ 998.295451] ? ext4_register_li_request+0x8e0/0x8e0 [ 998.296511] legacy_reconfigure+0x11b/0x190 [ 998.297415] reconfigure_super+0x414/0x9c0 [ 998.298309] ? fs_umode_to_dtype+0xb0/0xb0 [ 998.299194] path_mount+0x1ae0/0x2120 [ 998.300015] ? strncpy_from_user+0x9e/0x470 [ 998.300921] ? finish_automount+0xa90/0xa90 [ 998.301827] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.302813] __x64_sys_mount+0x282/0x300 [ 998.303672] ? copy_mnt_ns+0xa00/0xa00 [ 998.304499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.305604] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.306684] do_syscall_64+0x33/0x40 [ 998.307495] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.308640] RIP: 0033:0x7ff67ee7d04a [ 998.309419] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.313255] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.314846] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 998.316355] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.317888] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 998.319398] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.320911] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 998.322434] CPU: 0 PID: 6455 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 998.323222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 998.324170] Call Trace: [ 998.324477] dump_stack+0x107/0x167 [ 998.324895] should_fail.cold+0x5/0xa [ 998.325335] ? create_object.isra.0+0x3a/0xa20 [ 998.325865] should_failslab+0x5/0x20 [ 998.326306] kmem_cache_alloc+0x5b/0x310 [ 998.326772] ? create_object.isra.0+0x3ad/0xa20 [ 998.327307] create_object.isra.0+0x3a/0xa20 [ 998.327807] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 998.328397] __kmalloc_node+0x1ae/0x420 [ 998.328851] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 998.329444] memcg_slab_post_alloc_hook+0x1f0/0x430 [ 998.330010] ? trace_hardirqs_on+0x5b/0x180 [ 998.330507] kmem_cache_alloc_trace+0x169/0x320 [ 998.331041] ? cap_capable+0x1cd/0x230 [ 998.331458] alloc_fs_context+0x57/0x840 [ 998.331933] path_mount+0x962/0x2120 [ 998.332333] ? strncpy_from_user+0x9e/0x470 [ 998.332822] ? finish_automount+0xa90/0xa90 [ 998.333317] ? getname_flags.part.0+0x1dd/0x4f0 [ 998.333847] __x64_sys_mount+0x282/0x300 [ 998.334315] ? copy_mnt_ns+0xa00/0xa00 [ 998.334772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 998.335378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 998.335979] do_syscall_64+0x33/0x40 [ 998.336408] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 998.336993] RIP: 0033:0x7fb22ff0104a [ 998.337391] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 998.339504] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.340393] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 998.341216] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 998.342027] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 998.342852] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 998.343662] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 998.375446] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 998.377467] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) 15:47:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) 15:47:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) 15:47:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 12) 15:47:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) 15:47:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 15:47:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) [ 1013.967736] FAULT_INJECTION: forcing a failure. [ 1013.967736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1013.970264] CPU: 1 PID: 6463 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1013.971679] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1013.973403] Call Trace: [ 1013.973957] dump_stack+0x107/0x167 [ 1013.974710] should_fail.cold+0x5/0xa [ 1013.975507] strncpy_from_user+0x34/0x470 [ 1013.976381] getname_flags.part.0+0x95/0x4f0 [ 1013.977296] user_path_at_empty+0xa1/0x100 [ 1013.978180] __x64_sys_mount+0x1e9/0x300 [ 1013.979024] ? copy_mnt_ns+0xa00/0xa00 [ 1013.979840] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1013.980938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1013.982014] do_syscall_64+0x33/0x40 [ 1013.982788] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1013.983860] RIP: 0033:0x7f2f885a504a [ 1013.984639] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1013.988468] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1013.990045] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1013.991525] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1013.993022] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1013.994507] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1013.995990] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1014.010949] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.021578] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.025271] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.027584] FAULT_INJECTION: forcing a failure. [ 1014.027584] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.029976] CPU: 1 PID: 6475 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1014.031411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.033147] Call Trace: [ 1014.033693] dump_stack+0x107/0x167 [ 1014.034458] should_fail.cold+0x5/0xa [ 1014.035257] should_failslab+0x5/0x20 [ 1014.036053] __kmalloc_track_caller+0x79/0x370 [ 1014.037016] ? match_number+0xaf/0x1d0 [ 1014.037841] kmemdup_nul+0x2d/0xa0 [ 1014.038582] match_number+0xaf/0x1d0 [ 1014.039367] ? match_u64+0x190/0x190 [ 1014.040149] ? lock_acquire+0x197/0x470 [ 1014.040974] FAULT_INJECTION: forcing a failure. [ 1014.040974] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.043255] ? create_object.isra.0+0x3ad/0xa20 [ 1014.044228] parse_options+0x104f/0x24c0 [ 1014.045090] ? clear_qf_name+0x1f0/0x1f0 [ 1014.045938] ? trace_hardirqs_on+0x5b/0x180 [ 1014.046837] ? __kmalloc_track_caller+0x2c6/0x370 [ 1014.047831] ? ext4_remount+0xdf/0x26e0 [ 1014.048663] ? memcpy+0x39/0x60 [ 1014.049352] ext4_remount+0x540/0x26e0 [ 1014.050196] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.051227] ? do_raw_spin_unlock+0x4f/0x220 [ 1014.052141] ? _raw_spin_unlock+0x1a/0x30 [ 1014.053022] ? shrink_dentry_list+0x16/0x500 [ 1014.053938] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1014.055017] ? shrink_dentry_list+0x500/0x500 [ 1014.055961] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.057009] legacy_reconfigure+0x11b/0x190 [ 1014.057917] reconfigure_super+0x414/0x9c0 [ 1014.058794] ? fs_umode_to_dtype+0xb0/0xb0 [ 1014.059679] path_mount+0x1ae0/0x2120 [ 1014.060485] ? strncpy_from_user+0x9e/0x470 [ 1014.061386] ? finish_automount+0xa90/0xa90 [ 1014.062284] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.063268] __x64_sys_mount+0x282/0x300 [ 1014.064114] ? copy_mnt_ns+0xa00/0xa00 [ 1014.064937] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.066024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.067095] do_syscall_64+0x33/0x40 [ 1014.067866] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.068934] RIP: 0033:0x7f1dc49e504a [ 1014.069707] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.073532] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1014.075131] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 1014.076628] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1014.078112] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 1014.079600] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1014.081098] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1014.082612] CPU: 0 PID: 6471 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1014.084115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.085869] Call Trace: [ 1014.086432] dump_stack+0x107/0x167 [ 1014.087198] should_fail.cold+0x5/0xa [ 1014.088004] ? create_object.isra.0+0x3a/0xa20 [ 1014.088881] FAULT_INJECTION: forcing a failure. [ 1014.088881] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.088992] should_failslab+0x5/0x20 [ 1014.092050] kmem_cache_alloc+0x5b/0x310 [ 1014.092920] create_object.isra.0+0x3a/0xa20 [ 1014.093842] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.094913] kmem_cache_alloc+0x159/0x310 [ 1014.095788] getname_flags.part.0+0x50/0x4f0 [ 1014.096743] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.097847] getname+0x8e/0xd0 [ 1014.098525] do_sys_openat2+0xf9/0x4d0 [ 1014.099344] ? __kasan_slab_free+0x122/0x160 [ 1014.100267] ? build_open_flags+0x6f0/0x6f0 [ 1014.101299] ? __x64_sys_mount+0x227/0x300 [ 1014.102189] ? kfree+0xd7/0x340 [ 1014.102891] __x64_sys_openat+0x13f/0x1f0 [ 1014.103760] ? __ia32_sys_open+0x1c0/0x1c0 [ 1014.104683] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.105795] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.106876] do_syscall_64+0x33/0x40 [ 1014.107660] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.108745] RIP: 0033:0x7ff67ee2ea04 [ 1014.109524] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1014.113404] RSP: 002b:00007ff67c3f0f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1014.115000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee2ea04 [ 1014.116513] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1014.118010] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1014.119501] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1014.121013] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 1014.122543] CPU: 1 PID: 6473 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 1014.123979] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.125708] Call Trace: [ 1014.126254] dump_stack+0x107/0x167 [ 1014.127020] should_fail.cold+0x5/0xa [ 1014.127817] ? create_object.isra.0+0x3a/0xa20 [ 1014.128773] should_failslab+0x5/0x20 [ 1014.129565] kmem_cache_alloc+0x5b/0x310 [ 1014.130414] create_object.isra.0+0x3a/0xa20 [ 1014.131324] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.132397] kmem_cache_alloc+0x159/0x310 [ 1014.133261] __alloc_file+0x21/0x320 [ 1014.134035] alloc_empty_file+0x6d/0x170 [ 1014.134881] path_openat+0xe6/0x2770 [ 1014.135656] ? __lock_acquire+0x1657/0x5b00 [ 1014.136575] ? path_lookupat+0x860/0x860 [ 1014.137423] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1014.138524] ? lock_acquire+0x197/0x470 [ 1014.139349] ? find_held_lock+0x2c/0x110 [ 1014.140205] do_filp_open+0x190/0x3e0 [ 1014.141004] ? may_open_dev+0xf0/0xf0 [ 1014.141800] ? alloc_fd+0x2e7/0x670 [ 1014.142565] ? lock_downgrade+0x6d0/0x6d0 [ 1014.143424] ? do_raw_spin_lock+0x121/0x260 [ 1014.144321] ? rwlock_bug.part.0+0x90/0x90 [ 1014.145213] ? _raw_spin_unlock+0x1a/0x30 [ 1014.146078] ? alloc_fd+0x2e7/0x670 [ 1014.146854] do_sys_openat2+0x171/0x4d0 [ 1014.147681] ? __kasan_slab_free+0x122/0x160 [ 1014.148610] ? build_open_flags+0x6f0/0x6f0 [ 1014.149507] ? __x64_sys_mount+0x227/0x300 [ 1014.150388] ? kfree+0xd7/0x340 [ 1014.151078] __x64_sys_openat+0x13f/0x1f0 [ 1014.151939] ? __ia32_sys_open+0x1c0/0x1c0 [ 1014.152833] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.153921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.154992] do_syscall_64+0x33/0x40 [ 1014.155764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.156834] RIP: 0033:0x7f1a21a6ba04 [ 1014.157606] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1014.161425] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1014.163004] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 1014.164495] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1014.165994] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1014.167476] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1014.168966] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 1014.182633] FAULT_INJECTION: forcing a failure. [ 1014.182633] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.185084] CPU: 0 PID: 6474 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1014.186527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.188271] Call Trace: [ 1014.188837] dump_stack+0x107/0x167 [ 1014.189607] should_fail.cold+0x5/0xa [ 1014.190423] should_failslab+0x5/0x20 [ 1014.191229] __kmalloc_track_caller+0x79/0x370 [ 1014.192193] ? ext4_remount+0xdf/0x26e0 [ 1014.193054] kstrdup+0x36/0x70 [ 1014.193737] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.194790] ext4_remount+0xdf/0x26e0 [ 1014.195595] ? trace_hardirqs_on+0x5b/0x180 [ 1014.196532] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.197586] ? _cond_resched+0x12/0x80 [ 1014.198413] ? shrink_dentry_list+0x134/0x500 [ 1014.199358] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1014.200455] ? shrink_dcache_sb+0x1d5/0x220 [ 1014.201362] ? shrink_dentry_list+0x500/0x500 [ 1014.202317] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.203374] legacy_reconfigure+0x11b/0x190 [ 1014.204291] reconfigure_super+0x414/0x9c0 [ 1014.205195] ? fs_umode_to_dtype+0xb0/0xb0 [ 1014.206092] path_mount+0x1ae0/0x2120 [ 1014.206903] ? strncpy_from_user+0x9e/0x470 [ 1014.207812] ? finish_automount+0xa90/0xa90 [ 1014.208730] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.209722] __x64_sys_mount+0x282/0x300 [ 1014.210578] ? copy_mnt_ns+0xa00/0xa00 [ 1014.211404] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.212517] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.213611] do_syscall_64+0x33/0x40 [ 1014.214399] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.215480] RIP: 0033:0x7fb22ff0104a [ 1014.216269] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.220162] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1014.221778] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 1014.223287] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1014.224800] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 1014.226307] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1014.227818] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1014.229929] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.233404] FAULT_INJECTION: forcing a failure. [ 1014.233404] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.235796] CPU: 0 PID: 6476 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1014.237256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.239022] Call Trace: [ 1014.239579] dump_stack+0x107/0x167 [ 1014.240379] should_fail.cold+0x5/0xa [ 1014.241195] ? getname_flags.part.0+0x50/0x4f0 [ 1014.242169] should_failslab+0x5/0x20 [ 1014.242994] kmem_cache_alloc+0x5b/0x310 [ 1014.243863] getname_flags.part.0+0x50/0x4f0 [ 1014.244811] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.245928] getname+0x8e/0xd0 [ 1014.246616] do_sys_openat2+0xf9/0x4d0 [ 1014.247444] ? __kasan_slab_free+0x122/0x160 [ 1014.248385] ? build_open_flags+0x6f0/0x6f0 [ 1014.249313] ? __x64_sys_mount+0x227/0x300 [ 1014.250215] ? kfree+0xd7/0x340 [ 1014.250927] __x64_sys_openat+0x13f/0x1f0 15:47:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 13) [ 1014.251816] ? __ia32_sys_open+0x1c0/0x1c0 [ 1014.252908] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.254028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.255124] do_syscall_64+0x33/0x40 [ 1014.255911] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.257028] RIP: 0033:0x7ff6a26c5a04 [ 1014.257820] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1014.261724] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1014.263345] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1014.264012] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa1ffffff, 0x0, 0x0, 0x0, 0x0) [ 1014.264858] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1014.264869] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1014.264880] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1014.264890] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:47:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) 15:47:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) [ 1014.300550] FAULT_INJECTION: forcing a failure. [ 1014.300550] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.302968] CPU: 0 PID: 6480 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1014.304425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.306178] Call Trace: [ 1014.306750] dump_stack+0x107/0x167 [ 1014.307534] should_fail.cold+0x5/0xa [ 1014.308373] ? alloc_fs_context+0x57/0x840 [ 1014.309301] should_failslab+0x5/0x20 [ 1014.310106] kmem_cache_alloc_trace+0x55/0x320 [ 1014.311082] ? cap_capable+0x1cd/0x230 [ 1014.311916] ? cap_capable+0x1cd/0x230 [ 1014.312758] alloc_fs_context+0x57/0x840 [ 1014.313633] path_mount+0x962/0x2120 15:47:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) [ 1014.314432] ? strncpy_from_user+0x9e/0x470 [ 1014.315442] ? finish_automount+0xa90/0xa90 [ 1014.316376] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.317384] __x64_sys_mount+0x282/0x300 [ 1014.318245] ? copy_mnt_ns+0xa00/0xa00 [ 1014.319084] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.320204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.321337] do_syscall_64+0x33/0x40 [ 1014.322135] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.323220] RIP: 0033:0x7f2f885a504a [ 1014.324008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.327915] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1014.329542] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1014.331047] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1014.332581] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1014.334156] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1014.335664] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:47:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1014.394697] FAULT_INJECTION: forcing a failure. [ 1014.394697] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.397218] CPU: 0 PID: 6486 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1014.398696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.400474] Call Trace: [ 1014.401045] dump_stack+0x107/0x167 [ 1014.401820] should_fail.cold+0x5/0xa [ 1014.402642] should_failslab+0x5/0x20 [ 1014.403461] __kmalloc_track_caller+0x79/0x370 [ 1014.404445] ? match_number+0xaf/0x1d0 [ 1014.405292] kmemdup_nul+0x2d/0xa0 [ 1014.406064] match_number+0xaf/0x1d0 [ 1014.406877] ? match_u64+0x190/0x190 [ 1014.407675] ? lock_acquire+0x197/0x470 [ 1014.408537] ? create_object.isra.0+0x3ad/0xa20 [ 1014.409536] parse_options+0x104f/0x24c0 [ 1014.410416] ? clear_qf_name+0x1f0/0x1f0 [ 1014.411289] ? trace_hardirqs_on+0x5b/0x180 [ 1014.412217] ? __kmalloc_track_caller+0x2c6/0x370 [ 1014.413260] ? ext4_remount+0xdf/0x26e0 [ 1014.414112] ? memcpy+0x39/0x60 [ 1014.414814] ext4_remount+0x540/0x26e0 [ 1014.415674] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.416755] ? _cond_resched+0x12/0x80 [ 1014.417598] ? shrink_dentry_list+0x134/0x500 [ 1014.418549] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1014.419661] ? shrink_dentry_list+0x500/0x500 [ 1014.420648] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.421720] legacy_reconfigure+0x11b/0x190 [ 1014.422639] reconfigure_super+0x414/0x9c0 [ 1014.423546] ? fs_umode_to_dtype+0xb0/0xb0 [ 1014.424465] path_mount+0x1ae0/0x2120 [ 1014.425274] ? strncpy_from_user+0x9e/0x470 [ 1014.426201] ? finish_automount+0xa90/0xa90 [ 1014.427124] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.428130] __x64_sys_mount+0x282/0x300 [ 1014.429009] ? copy_mnt_ns+0xa00/0xa00 [ 1014.429841] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.430966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.432086] do_syscall_64+0x33/0x40 [ 1014.432896] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.433994] RIP: 0033:0x7f1dc49e504a [ 1014.434787] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.438732] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1014.440346] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 1014.441896] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1014.443424] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 1014.444955] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1014.446483] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1014.466928] FAULT_INJECTION: forcing a failure. [ 1014.466928] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.469221] CPU: 1 PID: 6488 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1014.470576] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.472207] Call Trace: [ 1014.472738] dump_stack+0x107/0x167 [ 1014.473457] should_fail.cold+0x5/0xa [ 1014.474208] ? create_object.isra.0+0x3a/0xa20 [ 1014.475103] should_failslab+0x5/0x20 [ 1014.475852] kmem_cache_alloc+0x5b/0x310 [ 1014.476664] create_object.isra.0+0x3a/0xa20 [ 1014.477524] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1014.478526] __kmalloc_track_caller+0x177/0x370 [ 1014.479430] ? match_number+0xaf/0x1d0 [ 1014.480207] kmemdup_nul+0x2d/0xa0 [ 1014.480905] match_number+0xaf/0x1d0 [ 1014.481634] ? match_u64+0x190/0x190 [ 1014.482363] ? lock_acquire+0x197/0x470 [ 1014.483141] ? create_object.isra.0+0x3ad/0xa20 [ 1014.484064] parse_options+0x104f/0x24c0 [ 1014.484877] ? clear_qf_name+0x1f0/0x1f0 [ 1014.485672] ? trace_hardirqs_on+0x5b/0x180 [ 1014.486519] ? __kmalloc_track_caller+0x2c6/0x370 [ 1014.487459] ? ext4_remount+0xdf/0x26e0 [ 1014.488245] ? memcpy+0x39/0x60 [ 1014.488898] ext4_remount+0x540/0x26e0 [ 1014.489682] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.490666] ? _cond_resched+0x12/0x80 [ 1014.491417] ? shrink_dentry_list+0x134/0x500 [ 1014.492290] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1014.493309] ? shrink_dentry_list+0x500/0x500 [ 1014.494192] ? ext4_register_li_request+0x8e0/0x8e0 [ 1014.495170] legacy_reconfigure+0x11b/0x190 [ 1014.496001] reconfigure_super+0x414/0x9c0 [ 1014.496827] ? fs_umode_to_dtype+0xb0/0xb0 [ 1014.497642] path_mount+0x1ae0/0x2120 [ 1014.498384] ? strncpy_from_user+0x9e/0x470 [ 1014.499218] ? finish_automount+0xa90/0xa90 [ 1014.500058] ? getname_flags.part.0+0x1dd/0x4f0 [ 1014.500965] __x64_sys_mount+0x282/0x300 [ 1014.501740] ? copy_mnt_ns+0xa00/0xa00 [ 1014.502497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.503514] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.504523] do_syscall_64+0x33/0x40 [ 1014.505255] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.506253] RIP: 0033:0x7ff67ee7d04a [ 1014.506984] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1014.510546] RSP: 002b:00007ff67c3f0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1014.512033] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee7d04a [ 1014.513415] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1014.514783] RBP: 00007ff67c3f1040 R08: 00007ff67c3f1040 R09: 0000000020000300 [ 1014.516152] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1014.517524] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 1014.525473] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.527468] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.530065] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1014.531778] FAULT_INJECTION: forcing a failure. [ 1014.531778] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.533917] CPU: 1 PID: 6491 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 1014.535215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1014.536794] Call Trace: [ 1014.537290] dump_stack+0x107/0x167 [ 1014.537980] should_fail.cold+0x5/0xa [ 1014.538699] ? security_file_alloc+0x34/0x170 [ 1014.539545] should_failslab+0x5/0x20 [ 1014.540268] kmem_cache_alloc+0x5b/0x310 [ 1014.541048] security_file_alloc+0x34/0x170 [ 1014.541863] __alloc_file+0xb7/0x320 [ 1014.542569] alloc_empty_file+0x6d/0x170 [ 1014.543332] path_openat+0xe6/0x2770 [ 1014.544034] ? __lock_acquire+0x1657/0x5b00 [ 1014.544896] ? path_lookupat+0x860/0x860 [ 1014.545667] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1014.546652] ? lock_acquire+0x197/0x470 [ 1014.547407] ? find_held_lock+0x2c/0x110 [ 1014.548199] do_filp_open+0x190/0x3e0 [ 1014.548938] ? may_open_dev+0xf0/0xf0 [ 1014.549666] ? alloc_fd+0x2e7/0x670 [ 1014.550362] ? lock_downgrade+0x6d0/0x6d0 [ 1014.551139] ? do_raw_spin_lock+0x121/0x260 [ 1014.551954] ? rwlock_bug.part.0+0x90/0x90 [ 1014.552772] ? _raw_spin_unlock+0x1a/0x30 [ 1014.553554] ? alloc_fd+0x2e7/0x670 [ 1014.554257] do_sys_openat2+0x171/0x4d0 [ 1014.555014] ? __kasan_slab_free+0x122/0x160 [ 1014.555846] ? build_open_flags+0x6f0/0x6f0 [ 1014.556671] ? __x64_sys_mount+0x227/0x300 [ 1014.557461] ? kfree+0xd7/0x340 [ 1014.558080] __x64_sys_openat+0x13f/0x1f0 [ 1014.558861] ? __ia32_sys_open+0x1c0/0x1c0 [ 1014.559663] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1014.560656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1014.561623] do_syscall_64+0x33/0x40 [ 1014.562315] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1014.563276] RIP: 0033:0x7f1a21a6ba04 [ 1014.563971] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1014.567422] RSP: 002b:00007f1a1f00cf30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1014.568866] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 1014.570197] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1014.571527] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1014.572875] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1014.574204] R13: 0000000020000380 R14: 00007f1a1f00d000 R15: 0000000020001ac0 [ 1014.578215] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.546209] FAULT_INJECTION: forcing a failure. [ 1031.546209] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.548626] CPU: 0 PID: 6503 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1031.550149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.551912] Call Trace: [ 1031.552468] dump_stack+0x107/0x167 [ 1031.553288] should_fail.cold+0x5/0xa 15:47:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) 15:47:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) 15:47:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 14) 15:47:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe4ffffff, 0x0, 0x0, 0x0, 0x0) 15:47:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) 15:47:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) 15:47:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) [ 1031.554085] ? create_object.isra.0+0x3a/0xa20 [ 1031.555237] should_failslab+0x5/0x20 [ 1031.556033] kmem_cache_alloc+0x5b/0x310 [ 1031.556927] create_object.isra.0+0x3a/0xa20 [ 1031.557887] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.558957] __kmalloc_track_caller+0x177/0x370 [ 1031.559970] ? match_number+0xaf/0x1d0 [ 1031.560810] kmemdup_nul+0x2d/0xa0 [ 1031.561584] match_number+0xaf/0x1d0 [ 1031.562355] ? match_u64+0x190/0x190 [ 1031.563183] ? lock_acquire+0x197/0x470 [ 1031.564062] ? create_object.isra.0+0x3ad/0xa20 [ 1031.565047] parse_options+0x104f/0x24c0 [ 1031.565946] ? clear_qf_name+0x1f0/0x1f0 [ 1031.566822] ? trace_hardirqs_on+0x5b/0x180 [ 1031.567737] ? __kmalloc_track_caller+0x2c6/0x370 [ 1031.567846] FAULT_INJECTION: forcing a failure. [ 1031.567846] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.568736] ? ext4_remount+0xdf/0x26e0 [ 1031.568754] ? memcpy+0x39/0x60 [ 1031.568785] ext4_remount+0x540/0x26e0 [ 1031.573631] ? ext4_register_li_request+0x8e0/0x8e0 [ 1031.574679] ? _cond_resched+0x12/0x80 [ 1031.575501] ? shrink_dentry_list+0x134/0x500 [ 1031.576443] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1031.577541] ? shrink_dentry_list+0x500/0x500 [ 1031.578531] ? ext4_register_li_request+0x8e0/0x8e0 [ 1031.579625] legacy_reconfigure+0x11b/0x190 [ 1031.580537] reconfigure_super+0x414/0x9c0 [ 1031.581428] ? fs_umode_to_dtype+0xb0/0xb0 [ 1031.582361] path_mount+0x1ae0/0x2120 [ 1031.583203] ? strncpy_from_user+0x9e/0x470 [ 1031.584096] ? finish_automount+0xa90/0xa90 [ 1031.585051] ? getname_flags.part.0+0x1dd/0x4f0 [ 1031.586037] __x64_sys_mount+0x282/0x300 [ 1031.586890] ? copy_mnt_ns+0xa00/0xa00 [ 1031.587713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.588816] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.589910] do_syscall_64+0x33/0x40 [ 1031.590693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.591764] RIP: 0033:0x7ff6a271404a [ 1031.592547] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.596372] RSP: 002b:00007ff69fc87fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1031.597982] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a271404a [ 1031.599478] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1031.600989] RBP: 00007ff69fc88040 R08: 00007ff69fc88040 R09: 0000000020000300 [ 1031.602496] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1031.603996] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 1031.605539] CPU: 1 PID: 6504 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1031.606992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.608720] Call Trace: [ 1031.609287] dump_stack+0x107/0x167 [ 1031.610055] should_fail.cold+0x5/0xa [ 1031.610855] ? create_object.isra.0+0x3a/0xa20 [ 1031.611868] should_failslab+0x5/0x20 [ 1031.612669] kmem_cache_alloc+0x5b/0x310 [ 1031.613567] create_object.isra.0+0x3a/0xa20 [ 1031.614514] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.615600] kmem_cache_alloc_trace+0x151/0x320 [ 1031.616592] ? cap_capable+0x1cd/0x230 [ 1031.617438] alloc_fs_context+0x57/0x840 [ 1031.618324] path_mount+0x962/0x2120 [ 1031.619122] ? strncpy_from_user+0x9e/0x470 [ 1031.619161] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.620036] ? finish_automount+0xa90/0xa90 [ 1031.620059] ? getname_flags.part.0+0x1dd/0x4f0 [ 1031.620092] __x64_sys_mount+0x282/0x300 [ 1031.622212] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.622823] ? copy_mnt_ns+0xa00/0xa00 [ 1031.622862] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.623942] FAULT_INJECTION: forcing a failure. [ 1031.623942] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.624851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.624883] do_syscall_64+0x33/0x40 [ 1031.632990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.634083] RIP: 0033:0x7f2f885a504a [ 1031.634866] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.638921] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1031.640822] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1031.642543] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1031.644169] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1031.645682] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1031.647180] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1031.648713] CPU: 0 PID: 6502 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1031.650184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.651930] Call Trace: [ 1031.652493] dump_stack+0x107/0x167 [ 1031.653270] should_fail.cold+0x5/0xa [ 1031.654078] ? getname_flags.part.0+0x50/0x4f0 [ 1031.655045] should_failslab+0x5/0x20 [ 1031.655848] kmem_cache_alloc+0x5b/0x310 [ 1031.656709] getname_flags.part.0+0x50/0x4f0 [ 1031.657647] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.658755] getname+0x8e/0xd0 [ 1031.659432] do_sys_openat2+0xf9/0x4d0 [ 1031.660253] ? __kasan_slab_free+0x122/0x160 [ 1031.660586] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.661174] ? build_open_flags+0x6f0/0x6f0 [ 1031.661196] ? __x64_sys_mount+0x227/0x300 [ 1031.661214] ? kfree+0xd7/0x340 [ 1031.661237] __x64_sys_openat+0x13f/0x1f0 [ 1031.661264] ? __ia32_sys_open+0x1c0/0x1c0 [ 1031.663981] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.664139] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.668698] FAULT_INJECTION: forcing a failure. [ 1031.668698] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.669114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.669136] do_syscall_64+0x33/0x40 [ 1031.669162] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.675441] RIP: 0033:0x7f1dc4996a04 [ 1031.676224] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1031.680106] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1031.681718] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1031.683219] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1031.684720] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1031.686228] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1031.687732] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1031.689269] CPU: 1 PID: 6509 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 1031.689512] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.690717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.690723] Call Trace: [ 1031.690748] dump_stack+0x107/0x167 [ 1031.690770] should_fail.cold+0x5/0xa [ 1031.693765] FAULT_INJECTION: forcing a failure. [ 1031.693765] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.694214] ? create_object.isra.0+0x3a/0xa20 [ 1031.699588] should_failslab+0x5/0x20 [ 1031.700410] kmem_cache_alloc+0x5b/0x310 [ 1031.701303] create_object.isra.0+0x3a/0xa20 [ 1031.702250] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.703347] kmem_cache_alloc+0x159/0x310 [ 1031.704244] __alloc_file+0x21/0x320 [ 1031.705053] alloc_empty_file+0x6d/0x170 [ 1031.705926] path_openat+0xe6/0x2770 [ 1031.706728] ? __lock_acquire+0x1657/0x5b00 [ 1031.707662] ? path_lookupat+0x860/0x860 [ 1031.708536] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1031.709666] ? lock_acquire+0x197/0x470 [ 1031.710519] ? find_held_lock+0x2c/0x110 [ 1031.711399] do_filp_open+0x190/0x3e0 [ 1031.712220] ? may_open_dev+0xf0/0xf0 [ 1031.713050] ? alloc_fd+0x2e7/0x670 [ 1031.713831] ? lock_downgrade+0x6d0/0x6d0 [ 1031.714719] ? do_raw_spin_lock+0x121/0x260 [ 1031.715643] ? rwlock_bug.part.0+0x90/0x90 [ 1031.716560] ? _raw_spin_unlock+0x1a/0x30 [ 1031.717455] ? alloc_fd+0x2e7/0x670 [ 1031.718246] do_sys_openat2+0x171/0x4d0 [ 1031.719100] ? __kasan_slab_free+0x122/0x160 [ 1031.720043] ? build_open_flags+0x6f0/0x6f0 [ 1031.720979] ? __x64_sys_mount+0x227/0x300 [ 1031.721887] ? kfree+0xd7/0x340 [ 1031.722600] __x64_sys_openat+0x13f/0x1f0 [ 1031.723496] ? __ia32_sys_open+0x1c0/0x1c0 [ 1031.724413] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.725551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.726662] do_syscall_64+0x33/0x40 [ 1031.727462] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.728566] RIP: 0033:0x7f1a21a6ba04 [ 1031.729374] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1031.733347] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1031.734985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 1031.736519] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1031.738066] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1031.739598] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1031.741138] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 1031.742701] CPU: 0 PID: 6511 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1031.744177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.745955] Call Trace: [ 1031.746516] dump_stack+0x107/0x167 [ 1031.747290] should_fail.cold+0x5/0xa [ 1031.748112] ? create_object.isra.0+0x3a/0xa20 [ 1031.749106] should_failslab+0x5/0x20 [ 1031.749915] kmem_cache_alloc+0x5b/0x310 [ 1031.750786] create_object.isra.0+0x3a/0xa20 [ 1031.751724] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1031.752810] __kmalloc_track_caller+0x177/0x370 [ 1031.753809] ? ext4_remount+0xdf/0x26e0 [ 1031.754669] kstrdup+0x36/0x70 [ 1031.755358] ? ext4_register_li_request+0x8e0/0x8e0 [ 1031.756417] ext4_remount+0xdf/0x26e0 [ 1031.757240] ? call_rcu+0x435/0x9c0 [ 1031.758012] ? call_rcu+0x2bd/0x9c0 [ 1031.758807] ? ext4_register_li_request+0x8e0/0x8e0 [ 1031.759878] ? _cond_resched+0x12/0x80 [ 1031.760706] ? shrink_dentry_list+0x134/0x500 [ 1031.761670] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1031.762786] ? shrink_dcache_sb+0x1d5/0x220 [ 1031.763701] ? shrink_dentry_list+0x500/0x500 [ 1031.764664] ? ext4_register_li_request+0x8e0/0x8e0 [ 1031.765767] legacy_reconfigure+0x11b/0x190 [ 1031.766691] reconfigure_super+0x414/0x9c0 [ 1031.767616] ? fs_umode_to_dtype+0xb0/0xb0 [ 1031.768520] path_mount+0x1ae0/0x2120 [ 1031.769347] ? strncpy_from_user+0x9e/0x470 [ 1031.770264] ? finish_automount+0xa90/0xa90 [ 1031.771187] ? getname_flags.part.0+0x1dd/0x4f0 [ 1031.772185] __x64_sys_mount+0x282/0x300 [ 1031.773066] ? copy_mnt_ns+0xa00/0xa00 [ 1031.773907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.775027] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.776130] do_syscall_64+0x33/0x40 [ 1031.776921] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.778022] RIP: 0033:0x7fb22ff0104a [ 1031.778813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.782740] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1031.784360] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 1031.785875] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1031.787377] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 1031.788879] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1031.790390] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1031.792404] FAULT_INJECTION: forcing a failure. [ 1031.792404] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.794977] CPU: 0 PID: 6510 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1031.796424] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.798181] Call Trace: [ 1031.798736] dump_stack+0x107/0x167 [ 1031.799508] should_fail.cold+0x5/0xa [ 1031.800312] ? __alloc_file+0x21/0x320 [ 1031.801145] should_failslab+0x5/0x20 [ 1031.801950] kmem_cache_alloc+0x5b/0x310 [ 1031.802812] __alloc_file+0x21/0x320 [ 1031.803599] alloc_empty_file+0x6d/0x170 [ 1031.804457] path_openat+0xe6/0x2770 [ 1031.805252] ? __lock_acquire+0x1657/0x5b00 [ 1031.806171] ? path_lookupat+0x860/0x860 [ 1031.807033] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1031.808138] ? lock_acquire+0x197/0x470 [ 1031.808992] ? find_held_lock+0x2c/0x110 [ 1031.809859] do_filp_open+0x190/0x3e0 [ 1031.810662] ? may_open_dev+0xf0/0xf0 [ 1031.811469] ? alloc_fd+0x2e7/0x670 [ 1031.812237] ? lock_downgrade+0x6d0/0x6d0 [ 1031.813120] ? do_raw_spin_lock+0x121/0x260 [ 1031.814029] ? rwlock_bug.part.0+0x90/0x90 [ 1031.814928] ? _raw_spin_unlock+0x1a/0x30 [ 1031.815802] ? alloc_fd+0x2e7/0x670 [ 1031.816580] do_sys_openat2+0x171/0x4d0 [ 1031.817428] ? __kasan_slab_free+0x122/0x160 [ 1031.818357] ? build_open_flags+0x6f0/0x6f0 [ 1031.819269] ? __x64_sys_mount+0x227/0x300 [ 1031.820151] ? kfree+0xd7/0x340 [ 1031.820847] __x64_sys_openat+0x13f/0x1f0 [ 1031.821721] ? __ia32_sys_open+0x1c0/0x1c0 [ 1031.822612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.823708] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.824789] do_syscall_64+0x33/0x40 [ 1031.825578] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.826648] RIP: 0033:0x7ff67ee2ea04 [ 1031.827425] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1031.831294] RSP: 002b:00007ff67c3f0f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1031.832888] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee2ea04 [ 1031.834390] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1031.835881] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1031.836947] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.837383] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1031.837395] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 1031.845095] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ffffff, 0x0, 0x0, 0x0, 0x0) 15:47:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) 15:47:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) [ 1031.946154] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) 15:47:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) 15:47:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) [ 1031.976772] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1031.979892] FAULT_INJECTION: forcing a failure. [ 1031.979892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1031.982306] CPU: 1 PID: 6520 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1031.983700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.985420] Call Trace: [ 1031.985975] dump_stack+0x107/0x167 [ 1031.986735] should_fail.cold+0x5/0xa [ 1031.987538] strncpy_from_user+0x34/0x470 [ 1031.988396] getname_flags.part.0+0x95/0x4f0 [ 1031.989317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.990400] getname+0x8e/0xd0 [ 1031.991068] do_sys_openat2+0xf9/0x4d0 [ 1031.991864] ? __kasan_slab_free+0x122/0x160 [ 1031.992765] ? build_open_flags+0x6f0/0x6f0 [ 1031.993667] ? __x64_sys_mount+0x227/0x300 [ 1031.994542] ? kfree+0xd7/0x340 [ 1031.995210] __x64_sys_openat+0x13f/0x1f0 [ 1031.996049] ? __ia32_sys_open+0x1c0/0x1c0 [ 1031.996943] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.998038] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.999111] do_syscall_64+0x33/0x40 [ 1031.999887] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.000947] RIP: 0033:0x7ff67ee2ea04 [ 1032.001736] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1032.005534] RSP: 002b:00007ff67c3f0f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1032.007112] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee2ea04 [ 1032.008583] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1032.010069] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1032.011543] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1032.013042] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 1032.017532] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 15) [ 1032.035938] FAULT_INJECTION: forcing a failure. [ 1032.035938] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.038080] CPU: 0 PID: 6523 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1032.039341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.040873] Call Trace: [ 1032.041374] dump_stack+0x107/0x167 [ 1032.042030] should_fail.cold+0x5/0xa [ 1032.042738] should_failslab+0x5/0x20 [ 1032.043445] __kmalloc_track_caller+0x79/0x370 [ 1032.044294] ? match_number+0xaf/0x1d0 [ 1032.045032] kmemdup_nul+0x2d/0xa0 [ 1032.045692] match_number+0xaf/0x1d0 15:47:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf4ffffff, 0x0, 0x0, 0x0, 0x0) [ 1032.046385] ? match_u64+0x190/0x190 [ 1032.047165] ? lock_acquire+0x197/0x470 [ 1032.047904] ? create_object.isra.0+0x3ad/0xa20 [ 1032.048774] parse_options+0x104f/0x24c0 [ 1032.049552] ? clear_qf_name+0x1f0/0x1f0 [ 1032.050316] ? trace_hardirqs_on+0x5b/0x180 [ 1032.051121] ? __kmalloc_track_caller+0x2c6/0x370 [ 1032.052012] ? ext4_remount+0xdf/0x26e0 [ 1032.052745] ? memcpy+0x39/0x60 [ 1032.053360] ext4_remount+0x540/0x26e0 [ 1032.054097] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.055016] ? _cond_resched+0x12/0x80 [ 1032.055730] ? shrink_dentry_list+0x134/0x500 [ 1032.056550] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1032.057513] ? shrink_dentry_list+0x500/0x500 [ 1032.058342] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.059259] legacy_reconfigure+0x11b/0x190 [ 1032.060052] reconfigure_super+0x414/0x9c0 [ 1032.060830] ? fs_umode_to_dtype+0xb0/0xb0 [ 1032.061615] path_mount+0x1ae0/0x2120 [ 1032.062319] ? strncpy_from_user+0x9e/0x470 [ 1032.063109] ? finish_automount+0xa90/0xa90 [ 1032.063901] ? getname_flags.part.0+0x1dd/0x4f0 [ 1032.064760] __x64_sys_mount+0x282/0x300 [ 1032.065512] ? copy_mnt_ns+0xa00/0xa00 [ 1032.066230] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.067192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.068136] do_syscall_64+0x33/0x40 [ 1032.068826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 15:47:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1032.069770] RIP: 0033:0x7fb22ff0104a [ 1032.070502] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.073822] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.075197] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 1032.076486] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1032.077783] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 1032.079057] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1032.080341] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1032.109186] FAULT_INJECTION: forcing a failure. [ 1032.109186] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.111257] CPU: 0 PID: 6533 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1032.112450] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.113905] Call Trace: [ 1032.114368] dump_stack+0x107/0x167 [ 1032.115005] should_fail.cold+0x5/0xa [ 1032.115672] ? legacy_init_fs_context+0x44/0xe0 [ 1032.116488] should_failslab+0x5/0x20 [ 1032.117157] kmem_cache_alloc_trace+0x55/0x320 [ 1032.117960] ? lockdep_init_map_type+0x2c7/0x780 [ 1032.118795] legacy_init_fs_context+0x44/0xe0 [ 1032.119580] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1032.120446] alloc_fs_context+0x4fd/0x840 [ 1032.121187] path_mount+0x962/0x2120 [ 1032.121843] ? strncpy_from_user+0x9e/0x470 [ 1032.122595] ? finish_automount+0xa90/0xa90 [ 1032.123350] ? getname_flags.part.0+0x1dd/0x4f0 [ 1032.124181] __x64_sys_mount+0x282/0x300 [ 1032.124891] ? copy_mnt_ns+0xa00/0xa00 [ 1032.125591] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.126505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.127399] do_syscall_64+0x33/0x40 [ 1032.128038] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.128929] RIP: 0033:0x7f2f885a504a [ 1032.129580] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.132753] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.134069] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1032.135317] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1032.136548] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1032.137796] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1032.139036] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:47:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 16) [ 1032.161175] FAULT_INJECTION: forcing a failure. [ 1032.161175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1032.161191] FAULT_INJECTION: forcing a failure. [ 1032.161191] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.161213] CPU: 0 PID: 6530 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1032.166659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.168076] Call Trace: [ 1032.168526] dump_stack+0x107/0x167 [ 1032.169170] should_fail.cold+0x5/0xa [ 1032.169826] should_failslab+0x5/0x20 [ 1032.170470] __kmalloc_track_caller+0x79/0x370 [ 1032.171242] ? match_number+0xaf/0x1d0 [ 1032.171910] kmemdup_nul+0x2d/0xa0 [ 1032.172521] match_number+0xaf/0x1d0 [ 1032.173172] ? match_u64+0x190/0x190 [ 1032.173815] ? lock_acquire+0x197/0x470 [ 1032.174495] ? create_object.isra.0+0x3ad/0xa20 [ 1032.175295] parse_options+0x104f/0x24c0 [ 1032.176008] ? clear_qf_name+0x1f0/0x1f0 [ 1032.176708] ? trace_hardirqs_on+0x5b/0x180 [ 1032.177456] ? __kmalloc_track_caller+0x2c6/0x370 [ 1032.178271] ? ext4_remount+0xdf/0x26e0 [ 1032.178940] ? memcpy+0x39/0x60 [ 1032.179497] ext4_remount+0x540/0x26e0 [ 1032.180167] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.181027] ? do_raw_spin_unlock+0x4f/0x220 [ 1032.181770] ? _raw_spin_unlock+0x1a/0x30 [ 1032.182468] ? shrink_dentry_list+0x16/0x500 [ 1032.183210] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1032.184083] ? shrink_dentry_list+0x500/0x500 [ 1032.184840] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.185697] legacy_reconfigure+0x11b/0x190 [ 1032.186419] reconfigure_super+0x414/0x9c0 [ 1032.187131] ? fs_umode_to_dtype+0xb0/0xb0 [ 1032.187849] path_mount+0x1ae0/0x2120 [ 1032.188492] ? strncpy_from_user+0x9e/0x470 [ 1032.189226] ? finish_automount+0xa90/0xa90 [ 1032.189949] ? getname_flags.part.0+0x1dd/0x4f0 [ 1032.190742] __x64_sys_mount+0x282/0x300 [ 1032.191435] ? copy_mnt_ns+0xa00/0xa00 [ 1032.192100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.192991] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.193860] do_syscall_64+0x33/0x40 [ 1032.194487] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.195338] RIP: 0033:0x7f1dc49e504a [ 1032.195956] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.199060] RSP: 002b:00007f1dc1f58fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.200332] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc49e504a [ 1032.201537] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1032.202724] RBP: 00007f1dc1f59040 R08: 00007f1dc1f59040 R09: 0000000020000300 [ 1032.203921] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1032.205122] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1032.206341] CPU: 1 PID: 6524 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1032.207783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.209518] Call Trace: [ 1032.210077] dump_stack+0x107/0x167 [ 1032.210839] should_fail.cold+0x5/0xa [ 1032.211643] strncpy_from_user+0x34/0x470 [ 1032.212520] getname_flags.part.0+0x95/0x4f0 [ 1032.213529] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.214611] getname+0x8e/0xd0 [ 1032.215281] do_sys_openat2+0xf9/0x4d0 [ 1032.216087] ? __kasan_slab_free+0x122/0x160 [ 1032.217017] ? build_open_flags+0x6f0/0x6f0 [ 1032.217913] ? __x64_sys_mount+0x227/0x300 [ 1032.218786] ? kfree+0xd7/0x340 [ 1032.219479] __x64_sys_openat+0x13f/0x1f0 [ 1032.220340] ? __ia32_sys_open+0x1c0/0x1c0 [ 1032.221232] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.222320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.223388] do_syscall_64+0x33/0x40 [ 1032.224156] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.225236] RIP: 0033:0x7ff6a26c5a04 [ 1032.226005] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1032.229791] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1032.231370] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1032.232842] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1032.234325] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1032.235804] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1032.237293] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:47:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 15:47:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) [ 1032.260613] FAULT_INJECTION: forcing a failure. [ 1032.260613] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.263039] CPU: 1 PID: 6538 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1032.264470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.266205] Call Trace: [ 1032.266751] dump_stack+0x107/0x167 [ 1032.267517] should_fail.cold+0x5/0xa [ 1032.268310] ? create_object.isra.0+0x3a/0xa20 [ 1032.269285] should_failslab+0x5/0x20 [ 1032.270088] kmem_cache_alloc+0x5b/0x310 [ 1032.270948] create_object.isra.0+0x3a/0xa20 [ 1032.271870] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1032.272940] kmem_cache_alloc_trace+0x151/0x320 [ 1032.273924] ? lockdep_init_map_type+0x2c7/0x780 [ 1032.274926] legacy_init_fs_context+0x44/0xe0 [ 1032.275877] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1032.276920] alloc_fs_context+0x4fd/0x840 [ 1032.277805] path_mount+0x962/0x2120 [ 1032.278593] ? strncpy_from_user+0x9e/0x470 [ 1032.279500] ? finish_automount+0xa90/0xa90 [ 1032.280405] ? getname_flags.part.0+0x1dd/0x4f0 [ 1032.281414] __x64_sys_mount+0x282/0x300 [ 1032.282279] ? copy_mnt_ns+0xa00/0xa00 [ 1032.283105] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.284214] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.285313] do_syscall_64+0x33/0x40 [ 1032.286102] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.287183] RIP: 0033:0x7f2f885a504a [ 1032.287970] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.291836] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.293451] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1032.294957] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1032.296455] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1032.297964] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1032.299468] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1032.308347] FAULT_INJECTION: forcing a failure. [ 1032.308347] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.310883] CPU: 1 PID: 6529 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 1032.312308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.314044] Call Trace: [ 1032.314591] dump_stack+0x107/0x167 [ 1032.315349] should_fail.cold+0x5/0xa [ 1032.316146] ? security_file_alloc+0x34/0x170 [ 1032.317091] should_failslab+0x5/0x20 [ 1032.317884] kmem_cache_alloc+0x5b/0x310 [ 1032.318736] security_file_alloc+0x34/0x170 [ 1032.319641] __alloc_file+0xb7/0x320 [ 1032.320420] alloc_empty_file+0x6d/0x170 [ 1032.321277] path_openat+0xe6/0x2770 [ 1032.322051] ? __lock_acquire+0x1657/0x5b00 [ 1032.322969] ? path_lookupat+0x860/0x860 [ 1032.323818] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1032.324903] ? lock_acquire+0x197/0x470 [ 1032.325741] ? find_held_lock+0x2c/0x110 [ 1032.326596] do_filp_open+0x190/0x3e0 [ 1032.327388] ? may_open_dev+0xf0/0xf0 [ 1032.328194] ? alloc_fd+0x2e7/0x670 [ 1032.328952] ? lock_downgrade+0x6d0/0x6d0 [ 1032.329842] ? do_raw_spin_lock+0x121/0x260 [ 1032.330739] ? rwlock_bug.part.0+0x90/0x90 [ 1032.331626] ? _raw_spin_unlock+0x1a/0x30 [ 1032.332490] ? alloc_fd+0x2e7/0x670 [ 1032.333266] do_sys_openat2+0x171/0x4d0 [ 1032.334098] ? __kasan_slab_free+0x122/0x160 [ 1032.335016] ? build_open_flags+0x6f0/0x6f0 [ 1032.335917] ? __x64_sys_mount+0x227/0x300 [ 1032.336797] ? kfree+0xd7/0x340 [ 1032.337504] __x64_sys_openat+0x13f/0x1f0 [ 1032.337565] FAULT_INJECTION: forcing a failure. [ 1032.337565] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.338366] ? __ia32_sys_open+0x1c0/0x1c0 [ 1032.338397] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.341963] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.343039] do_syscall_64+0x33/0x40 [ 1032.343804] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.344869] RIP: 0033:0x7f1a21a6ba04 [ 1032.345634] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1032.349374] RSP: 002b:00007f1a1f02df30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1032.350947] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6ba04 [ 1032.352424] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1032.353908] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1032.355380] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1032.356848] R13: 0000000020000380 R14: 00007f1a1f02e000 R15: 0000000020001ac0 [ 1032.358358] CPU: 0 PID: 6540 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1032.359366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1032.360565] Call Trace: [ 1032.360953] dump_stack+0x107/0x167 [ 1032.361489] should_fail.cold+0x5/0xa [ 1032.362042] ? create_object.isra.0+0x3a/0xa20 [ 1032.362703] should_failslab+0x5/0x20 [ 1032.363255] kmem_cache_alloc+0x5b/0x310 [ 1032.363847] create_object.isra.0+0x3a/0xa20 [ 1032.364480] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1032.365236] __kmalloc_track_caller+0x177/0x370 [ 1032.365912] ? match_number+0xaf/0x1d0 [ 1032.366489] kmemdup_nul+0x2d/0xa0 [ 1032.367001] match_number+0xaf/0x1d0 [ 1032.367533] ? match_u64+0x190/0x190 [ 1032.368078] ? lock_acquire+0x197/0x470 [ 1032.368646] ? create_object.isra.0+0x3ad/0xa20 [ 1032.369334] parse_options+0x104f/0x24c0 [ 1032.369925] ? clear_qf_name+0x1f0/0x1f0 [ 1032.370518] ? trace_hardirqs_on+0x5b/0x180 [ 1032.371140] ? __kmalloc_track_caller+0x2c6/0x370 [ 1032.371828] ? ext4_remount+0xdf/0x26e0 [ 1032.372398] ? memcpy+0x39/0x60 [ 1032.372885] ext4_remount+0x540/0x26e0 [ 1032.373468] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.374181] ? do_raw_spin_unlock+0x4f/0x220 [ 1032.374822] ? _raw_spin_unlock+0x1a/0x30 [ 1032.375420] ? shrink_dentry_list+0x16/0x500 [ 1032.376051] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1032.376799] ? shrink_dentry_list+0x500/0x500 [ 1032.377454] ? ext4_register_li_request+0x8e0/0x8e0 [ 1032.378177] legacy_reconfigure+0x11b/0x190 [ 1032.378800] reconfigure_super+0x414/0x9c0 [ 1032.379410] ? fs_umode_to_dtype+0xb0/0xb0 [ 1032.380017] path_mount+0x1ae0/0x2120 [ 1032.380578] ? strncpy_from_user+0x9e/0x470 [ 1032.381198] ? finish_automount+0xa90/0xa90 [ 1032.381815] ? getname_flags.part.0+0x1dd/0x4f0 [ 1032.382481] __x64_sys_mount+0x282/0x300 [ 1032.383066] ? copy_mnt_ns+0xa00/0xa00 [ 1032.383621] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1032.384365] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1032.385106] do_syscall_64+0x33/0x40 [ 1032.385642] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1032.386374] RIP: 0033:0x7fb22ff0104a [ 1032.386905] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1032.389530] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1032.390626] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 1032.391665] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1032.392674] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 1032.393692] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1032.394691] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1046.962598] EXT4-fs: 7 callbacks suppressed [ 1046.962607] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:47:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) 15:47:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) 15:47:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) [ 1046.974288] FAULT_INJECTION: forcing a failure. [ 1046.974288] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.975537] CPU: 0 PID: 6553 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1046.976291] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1046.977197] Call Trace: [ 1046.977497] dump_stack+0x107/0x167 [ 1046.977902] should_fail.cold+0x5/0xa [ 1046.978329] ? legacy_init_fs_context+0x44/0xe0 [ 1046.978838] should_failslab+0x5/0x20 [ 1046.979257] kmem_cache_alloc_trace+0x55/0x320 [ 1046.979761] ? lockdep_init_map_type+0x2c7/0x780 [ 1046.980299] legacy_init_fs_context+0x44/0xe0 [ 1046.980794] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1046.981335] alloc_fs_context+0x4fd/0x840 [ 1046.981798] path_mount+0x962/0x2120 [ 1046.982211] ? strncpy_from_user+0x9e/0x470 [ 1046.982678] ? finish_automount+0xa90/0xa90 [ 1046.983158] ? getname_flags.part.0+0x1dd/0x4f0 [ 1046.983677] __x64_sys_mount+0x282/0x300 [ 1046.984128] ? copy_mnt_ns+0xa00/0xa00 [ 1046.984558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1046.985129] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1046.985716] do_syscall_64+0x33/0x40 [ 1046.986126] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1046.986694] RIP: 0033:0x7f2f885a504a [ 1046.987101] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1046.989126] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1046.989990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1046.990772] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1046.991552] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1046.992461] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1046.993274] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1046.995165] FAULT_INJECTION: forcing a failure. [ 1046.995165] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.996455] CPU: 0 PID: 6550 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1046.997256] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1046.998252] Call Trace: [ 1046.998558] dump_stack+0x107/0x167 [ 1046.998980] should_fail.cold+0x5/0xa [ 1046.999425] ? __alloc_file+0x21/0x320 [ 1046.999876] should_failslab+0x5/0x20 [ 1047.000319] kmem_cache_alloc+0x5b/0x310 [ 1047.000793] __alloc_file+0x21/0x320 [ 1047.001223] alloc_empty_file+0x6d/0x170 [ 1047.001713] path_openat+0xe6/0x2770 [ 1047.002142] ? __lock_acquire+0x1657/0x5b00 [ 1047.002664] ? path_lookupat+0x860/0x860 [ 1047.003146] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1047.003756] ? lock_acquire+0x197/0x470 [ 1047.004217] ? find_held_lock+0x2c/0x110 [ 1047.004701] do_filp_open+0x190/0x3e0 [ 1047.005142] ? may_open_dev+0xf0/0xf0 [ 1047.005598] ? alloc_fd+0x2e7/0x670 [ 1047.006023] ? lock_downgrade+0x6d0/0x6d0 [ 1047.006500] ? do_raw_spin_lock+0x121/0x260 [ 1047.007010] ? rwlock_bug.part.0+0x90/0x90 [ 1047.007507] ? _raw_spin_unlock+0x1a/0x30 [ 1047.007989] ? alloc_fd+0x2e7/0x670 [ 1047.008416] do_sys_openat2+0x171/0x4d0 [ 1047.008878] ? __kasan_slab_free+0x122/0x160 [ 1047.009384] ? build_open_flags+0x6f0/0x6f0 [ 1047.009892] ? __x64_sys_mount+0x227/0x300 [ 1047.010388] ? kfree+0xd7/0x340 [ 1047.010771] __x64_sys_openat+0x13f/0x1f0 [ 1047.011248] ? __ia32_sys_open+0x1c0/0x1c0 [ 1047.011740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.012350] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.012952] do_syscall_64+0x33/0x40 [ 1047.013379] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.013982] RIP: 0033:0x7ff6a26c5a04 [ 1047.014409] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1047.016628] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1047.017748] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1047.018838] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1047.019918] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1047.021004] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1047.022104] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:47:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfbffffff, 0x0, 0x0, 0x0, 0x0) 15:47:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 17) 15:47:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) 15:47:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 29) [ 1047.033227] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.037275] FAULT_INJECTION: forcing a failure. [ 1047.037275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1047.038797] CPU: 0 PID: 6554 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1047.039581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.040603] Call Trace: [ 1047.040943] dump_stack+0x107/0x167 [ 1047.041415] should_fail.cold+0x5/0xa [ 1047.041934] strncpy_from_user+0x34/0x470 [ 1047.042463] getname_flags.part.0+0x95/0x4f0 [ 1047.042718] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.043006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.043026] getname+0x8e/0xd0 [ 1047.046077] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.046151] do_sys_openat2+0xf9/0x4d0 [ 1047.048585] ? __kasan_slab_free+0x122/0x160 [ 1047.049100] ? build_open_flags+0x6f0/0x6f0 [ 1047.049642] ? __x64_sys_mount+0x227/0x300 [ 1047.050114] ? kfree+0xd7/0x340 [ 1047.050474] __x64_sys_openat+0x13f/0x1f0 [ 1047.050956] ? __ia32_sys_open+0x1c0/0x1c0 [ 1047.051458] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.052069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.052628] do_syscall_64+0x33/0x40 [ 1047.052772] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.053031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.053049] RIP: 0033:0x7f1dc4996a04 [ 1047.055888] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1047.056834] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.057971] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1047.057983] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1047.057989] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1047.057995] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1047.058001] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1047.058007] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1047.073142] FAULT_INJECTION: forcing a failure. [ 1047.073142] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.075750] CPU: 1 PID: 6563 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1047.077348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.079350] Call Trace: [ 1047.079997] dump_stack+0x107/0x167 [ 1047.081012] should_fail.cold+0x5/0xa [ 1047.081889] ? create_object.isra.0+0x3a/0xa20 [ 1047.083147] should_failslab+0x5/0x20 [ 1047.084061] kmem_cache_alloc+0x5b/0x310 [ 1047.085191] create_object.isra.0+0x3a/0xa20 [ 1047.086222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.087438] __kmalloc_track_caller+0x177/0x370 [ 1047.088729] ? match_number+0xaf/0x1d0 [ 1047.089703] kmemdup_nul+0x2d/0xa0 15:47:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 18) [ 1047.090676] match_number+0xaf/0x1d0 [ 1047.091713] ? match_u64+0x190/0x190 [ 1047.092607] ? lock_acquire+0x197/0x470 [ 1047.093543] ? create_object.isra.0+0x3ad/0xa20 [ 1047.094610] parse_options+0x104f/0x24c0 [ 1047.095550] ? clear_qf_name+0x1f0/0x1f0 [ 1047.096670] ? trace_hardirqs_on+0x5b/0x180 [ 1047.097689] ? __kmalloc_track_caller+0x2c6/0x370 [ 1047.098792] ? ext4_remount+0xdf/0x26e0 [ 1047.099885] ? memcpy+0x39/0x60 [ 1047.100693] ext4_remount+0x540/0x26e0 [ 1047.101625] ? ext4_register_li_request+0x8e0/0x8e0 [ 1047.102739] ? do_raw_spin_unlock+0x4f/0x220 [ 1047.103733] ? _raw_spin_unlock+0x1a/0x30 15:47:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) [ 1047.104654] ? shrink_dentry_list+0x16/0x500 [ 1047.105968] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1047.107146] ? shrink_dentry_list+0x500/0x500 [ 1047.108176] ? ext4_register_li_request+0x8e0/0x8e0 [ 1047.109301] legacy_reconfigure+0x11b/0x190 [ 1047.110292] reconfigure_super+0x414/0x9c0 [ 1047.111250] ? fs_umode_to_dtype+0xb0/0xb0 [ 1047.112204] path_mount+0x1ae0/0x2120 [ 1047.113073] ? strncpy_from_user+0x9e/0x470 [ 1047.113771] FAULT_INJECTION: forcing a failure. [ 1047.113771] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.114062] ? finish_automount+0xa90/0xa90 [ 1047.116408] ? getname_flags.part.0+0x1dd/0x4f0 [ 1047.117551] __x64_sys_mount+0x282/0x300 [ 1047.118511] ? copy_mnt_ns+0xa00/0xa00 [ 1047.119451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.120692] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.121924] do_syscall_64+0x33/0x40 [ 1047.122808] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.124017] RIP: 0033:0x7fb22ff0104a [ 1047.124900] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1047.129250] RSP: 002b:00007fb22d474fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1047.131054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22ff0104a [ 1047.132739] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1047.134442] RBP: 00007fb22d475040 R08: 00007fb22d475040 R09: 0000000020000300 [ 1047.136249] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1047.137940] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1047.139646] CPU: 0 PID: 6560 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1047.140489] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.141466] Call Trace: [ 1047.141810] dump_stack+0x107/0x167 [ 1047.142238] should_fail.cold+0x5/0xa [ 1047.142708] ? __alloc_file+0x21/0x320 [ 1047.143163] should_failslab+0x5/0x20 [ 1047.143617] kmem_cache_alloc+0x5b/0x310 [ 1047.144083] __alloc_file+0x21/0x320 [ 1047.144532] alloc_empty_file+0x6d/0x170 [ 1047.144829] FAULT_INJECTION: forcing a failure. [ 1047.144829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1047.145010] path_openat+0xe6/0x2770 [ 1047.148143] ? __lock_acquire+0x1657/0x5b00 [ 1047.148662] ? path_lookupat+0x860/0x860 [ 1047.149135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1047.149759] ? lock_acquire+0x197/0x470 [ 1047.150215] ? find_held_lock+0x2c/0x110 [ 1047.150696] do_filp_open+0x190/0x3e0 [ 1047.151129] ? may_open_dev+0xf0/0xf0 [ 1047.151583] ? alloc_fd+0x2e7/0x670 [ 1047.152003] ? lock_downgrade+0x6d0/0x6d0 [ 1047.152486] ? do_raw_spin_lock+0x121/0x260 [ 1047.152994] ? rwlock_bug.part.0+0x90/0x90 [ 1047.153485] ? _raw_spin_unlock+0x1a/0x30 [ 1047.153976] ? alloc_fd+0x2e7/0x670 [ 1047.154403] do_sys_openat2+0x171/0x4d0 [ 1047.154870] ? __kasan_slab_free+0x122/0x160 [ 1047.155378] ? build_open_flags+0x6f0/0x6f0 [ 1047.155876] ? __x64_sys_mount+0x227/0x300 [ 1047.156363] ? kfree+0xd7/0x340 [ 1047.156763] __x64_sys_openat+0x13f/0x1f0 [ 1047.157237] ? __ia32_sys_open+0x1c0/0x1c0 [ 1047.157756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.158385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.159032] do_syscall_64+0x33/0x40 [ 1047.159554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.160256] RIP: 0033:0x7ff67ee2ea04 [ 1047.160809] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1047.163470] RSP: 002b:00007ff67c3f0f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1047.164573] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee2ea04 [ 1047.165610] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1047.166635] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1047.167662] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1047.168693] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 [ 1047.169772] CPU: 1 PID: 6564 Comm: syz-executor.3 Not tainted 5.10.233 #1 [ 1047.171412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.173368] Call Trace: [ 1047.174013] dump_stack+0x107/0x167 [ 1047.174869] should_fail.cold+0x5/0xa [ 1047.175770] _copy_from_user+0x2e/0x1b0 [ 1047.176717] kstrtouint_from_user+0xbd/0x220 [ 1047.177766] ? kstrtou8_from_user+0x210/0x210 [ 1047.178831] ? lock_acquire+0x197/0x470 [ 1047.179773] ? ksys_write+0x12d/0x260 [ 1047.180680] proc_fail_nth_write+0x78/0x220 [ 1047.181713] ? proc_task_getattr+0x1f0/0x1f0 [ 1047.182761] ? proc_task_getattr+0x1f0/0x1f0 [ 1047.183792] vfs_write+0x29a/0xb10 [ 1047.184637] ksys_write+0x12d/0x260 [ 1047.185503] ? __ia32_sys_read+0xb0/0xb0 [ 1047.186629] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.187937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.189363] do_syscall_64+0x33/0x40 [ 1047.190281] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.191487] RIP: 0033:0x7f1a21a6b5ff [ 1047.192376] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1047.196745] RSP: 002b:00007f1a1f02e170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1047.198598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1a21a6b5ff [ 1047.200302] RDX: 0000000000000001 RSI: 00007f1a1f02e1e0 RDI: 0000000000000003 [ 1047.202033] RBP: 00007f1a1f02e1d0 R08: 0000000000000000 R09: 0000000020000300 [ 1047.203747] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1047.205461] R13: 00007ffd5093b36f R14: 00007f1a1f02e300 R15: 0000000000022000 15:47:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, 0x0) [ 1047.319155] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.321595] FAULT_INJECTION: forcing a failure. [ 1047.321595] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.323927] CPU: 0 PID: 6567 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1047.325359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.327080] Call Trace: [ 1047.327631] dump_stack+0x107/0x167 [ 1047.328389] should_fail.cold+0x5/0xa [ 1047.329190] ? create_object.isra.0+0x3a/0xa20 [ 1047.330157] should_failslab+0x5/0x20 [ 1047.330954] kmem_cache_alloc+0x5b/0x310 [ 1047.331811] create_object.isra.0+0x3a/0xa20 [ 1047.332736] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.333812] __kmalloc_track_caller+0x177/0x370 [ 1047.334779] ? ext4_remount+0xdf/0x26e0 [ 1047.335622] kstrdup+0x36/0x70 [ 1047.336295] ? ext4_register_li_request+0x8e0/0x8e0 [ 1047.337334] ext4_remount+0xdf/0x26e0 [ 1047.338135] ? trace_hardirqs_on+0x5b/0x180 [ 1047.339052] ? ext4_register_li_request+0x8e0/0x8e0 [ 1047.340101] ? _cond_resched+0x12/0x80 [ 1047.340911] ? shrink_dentry_list+0x134/0x500 [ 1047.341854] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1047.342928] ? shrink_dcache_sb+0x1d5/0x220 [ 1047.343817] ? shrink_dentry_list+0x500/0x500 [ 1047.344766] ? ext4_register_li_request+0x8e0/0x8e0 [ 1047.345809] legacy_reconfigure+0x11b/0x190 [ 1047.346703] reconfigure_super+0x414/0x9c0 [ 1047.347595] ? fs_umode_to_dtype+0xb0/0xb0 [ 1047.348479] path_mount+0x1ae0/0x2120 [ 1047.349281] ? strncpy_from_user+0x9e/0x470 [ 1047.350189] ? finish_automount+0xa90/0xa90 [ 1047.351086] ? getname_flags.part.0+0x1dd/0x4f0 [ 1047.352059] __x64_sys_mount+0x282/0x300 [ 1047.352903] ? copy_mnt_ns+0xa00/0xa00 [ 1047.353760] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.354851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.355922] do_syscall_64+0x33/0x40 [ 1047.356693] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.357775] RIP: 0033:0x7f2f885a504a [ 1047.358559] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1047.362404] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1047.363990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1047.365462] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1047.366967] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1047.368457] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1047.369947] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1047.398648] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.400641] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1047.402873] FAULT_INJECTION: forcing a failure. [ 1047.402873] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.405380] CPU: 0 PID: 6569 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1047.406792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1047.408520] Call Trace: [ 1047.409087] dump_stack+0x107/0x167 [ 1047.409860] should_fail.cold+0x5/0xa [ 1047.410641] ? create_object.isra.0+0x3a/0xa20 [ 1047.411589] should_failslab+0x5/0x20 [ 1047.412368] kmem_cache_alloc+0x5b/0x310 [ 1047.413207] create_object.isra.0+0x3a/0xa20 [ 1047.414129] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1047.415175] kmem_cache_alloc+0x159/0x310 [ 1047.416030] __alloc_file+0x21/0x320 [ 1047.416795] alloc_empty_file+0x6d/0x170 [ 1047.417635] path_openat+0xe6/0x2770 [ 1047.418403] ? __lock_acquire+0x1657/0x5b00 [ 1047.419297] ? path_lookupat+0x860/0x860 [ 1047.420138] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1047.421210] ? lock_acquire+0x197/0x470 [ 1047.422044] ? find_held_lock+0x2c/0x110 [ 1047.422885] do_filp_open+0x190/0x3e0 [ 1047.423668] ? may_open_dev+0xf0/0xf0 [ 1047.424459] ? alloc_fd+0x2e7/0x670 [ 1047.425204] ? lock_downgrade+0x6d0/0x6d0 [ 1047.426061] ? do_raw_spin_lock+0x121/0x260 [ 1047.426945] ? rwlock_bug.part.0+0x90/0x90 [ 1047.427820] ? _raw_spin_unlock+0x1a/0x30 [ 1047.428669] ? alloc_fd+0x2e7/0x670 [ 1047.429429] do_sys_openat2+0x171/0x4d0 [ 1047.430256] ? __kasan_slab_free+0x122/0x160 [ 1047.431161] ? build_open_flags+0x6f0/0x6f0 [ 1047.432052] ? __x64_sys_mount+0x227/0x300 [ 1047.432922] ? kfree+0xd7/0x340 [ 1047.433610] __x64_sys_openat+0x13f/0x1f0 [ 1047.434464] ? __ia32_sys_open+0x1c0/0x1c0 [ 1047.435338] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1047.436413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1047.437475] do_syscall_64+0x33/0x40 [ 1047.438247] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1047.439301] RIP: 0033:0x7ff6a26c5a04 [ 1047.440070] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1047.443853] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1047.445417] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1047.446893] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1047.448366] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1047.449848] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1047.451320] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:47:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) 15:47:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) [ 1061.953622] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1061.954846] FAULT_INJECTION: forcing a failure. [ 1061.954846] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.956138] CPU: 0 PID: 6584 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1061.956909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1061.957855] Call Trace: [ 1061.958163] dump_stack+0x107/0x167 [ 1061.958572] should_fail.cold+0x5/0xa [ 1061.959007] should_failslab+0x5/0x20 [ 1061.959439] __kmalloc_track_caller+0x79/0x370 [ 1061.959972] ? match_number+0xaf/0x1d0 [ 1061.960426] kmemdup_nul+0x2d/0xa0 [ 1061.960830] match_number+0xaf/0x1d0 [ 1061.961253] ? match_u64+0x190/0x190 [ 1061.961696] ? lock_acquire+0x197/0x470 [ 1061.962158] ? create_object.isra.0+0x3ad/0xa20 [ 1061.962698] parse_options+0x104f/0x24c0 [ 1061.963165] ? clear_qf_name+0x1f0/0x1f0 [ 1061.963631] ? trace_hardirqs_on+0x5b/0x180 [ 1061.964121] ? __kmalloc_track_caller+0x2c6/0x370 [ 1061.964673] ? ext4_remount+0xdf/0x26e0 [ 1061.965123] ? memcpy+0x39/0x60 [ 1061.965509] ext4_remount+0x540/0x26e0 [ 1061.965968] ? ext4_register_li_request+0x8e0/0x8e0 [ 1061.966561] ? _cond_resched+0x12/0x80 [ 1061.967004] ? shrink_dentry_list+0x134/0x500 [ 1061.967519] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1061.968110] ? shrink_dentry_list+0x500/0x500 [ 1061.968625] ? ext4_register_li_request+0x8e0/0x8e0 [ 1061.969188] legacy_reconfigure+0x11b/0x190 [ 1061.969679] reconfigure_super+0x414/0x9c0 [ 1061.970171] ? fs_umode_to_dtype+0xb0/0xb0 [ 1061.970654] path_mount+0x1ae0/0x2120 [ 1061.971103] ? strncpy_from_user+0x9e/0x470 [ 1061.971594] ? finish_automount+0xa90/0xa90 [ 1061.972084] ? getname_flags.part.0+0x1dd/0x4f0 [ 1061.972611] __x64_sys_mount+0x282/0x300 [ 1061.973074] ? copy_mnt_ns+0xa00/0xa00 [ 1061.973513] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1061.974119] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1061.974710] do_syscall_64+0x33/0x40 [ 1061.975138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1061.975723] RIP: 0033:0x7f2f885a504a [ 1061.976149] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1061.978237] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1061.979102] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1061.979926] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1061.980743] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1061.981553] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1061.982374] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:47:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 19) 15:47:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) 15:47:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:47:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xff010000, 0x0, 0x0, 0x0, 0x0) 15:47:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) [ 1062.001201] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.003128] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.004957] FAULT_INJECTION: forcing a failure. [ 1062.004957] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.007209] CPU: 1 PID: 6589 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1062.008617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1062.010305] Call Trace: [ 1062.010859] dump_stack+0x107/0x167 [ 1062.011617] should_fail.cold+0x5/0xa [ 1062.012404] ? __alloc_file+0x21/0x320 [ 1062.013203] should_failslab+0x5/0x20 [ 1062.014002] kmem_cache_alloc+0x5b/0x310 [ 1062.014842] __alloc_file+0x21/0x320 [ 1062.015612] alloc_empty_file+0x6d/0x170 [ 1062.016444] path_openat+0xe6/0x2770 [ 1062.016819] FAULT_INJECTION: forcing a failure. [ 1062.016819] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.017216] ? __lock_acquire+0x1657/0x5b00 [ 1062.017244] ? path_lookupat+0x860/0x860 [ 1062.020208] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1062.021301] ? lock_acquire+0x197/0x470 [ 1062.022127] ? find_held_lock+0x2c/0x110 [ 1062.022990] do_filp_open+0x190/0x3e0 [ 1062.023770] ? may_open_dev+0xf0/0xf0 [ 1062.024574] ? alloc_fd+0x2e7/0x670 [ 1062.025300] ? lock_downgrade+0x6d0/0x6d0 [ 1062.026172] ? do_raw_spin_lock+0x121/0x260 [ 1062.027072] ? rwlock_bug.part.0+0x90/0x90 [ 1062.027943] ? _raw_spin_unlock+0x1a/0x30 [ 1062.028810] ? alloc_fd+0x2e7/0x670 [ 1062.029573] do_sys_openat2+0x171/0x4d0 [ 1062.030404] ? __kasan_slab_free+0x122/0x160 [ 1062.031304] ? build_open_flags+0x6f0/0x6f0 [ 1062.032195] ? __x64_sys_mount+0x227/0x300 [ 1062.033065] ? kfree+0xd7/0x340 [ 1062.033749] __x64_sys_openat+0x13f/0x1f0 [ 1062.034608] ? __ia32_sys_open+0x1c0/0x1c0 [ 1062.035488] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.036564] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.037632] do_syscall_64+0x33/0x40 [ 1062.038413] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.039471] RIP: 0033:0x7f1dc4996a04 [ 1062.040239] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1062.044051] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1062.045621] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1062.047111] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1062.048590] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1062.050082] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1062.051550] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1062.053047] CPU: 0 PID: 6587 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1062.053825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1062.054756] Call Trace: [ 1062.055054] dump_stack+0x107/0x167 [ 1062.055463] should_fail.cold+0x5/0xa [ 1062.055891] ? create_object.isra.0+0x3a/0xa20 [ 1062.056420] should_failslab+0x5/0x20 [ 1062.056855] kmem_cache_alloc+0x5b/0x310 [ 1062.056977] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.057322] create_object.isra.0+0x3a/0xa20 [ 1062.059231] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.059470] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1062.059487] kmem_cache_alloc+0x159/0x310 [ 1062.062158] __alloc_file+0x21/0x320 [ 1062.062577] alloc_empty_file+0x6d/0x170 [ 1062.063031] path_openat+0xe6/0x2770 [ 1062.063111] FAULT_INJECTION: forcing a failure. [ 1062.063111] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.063450] ? __lock_acquire+0x1657/0x5b00 [ 1062.063467] ? path_lookupat+0x860/0x860 [ 1062.066661] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1062.067239] ? lock_acquire+0x197/0x470 [ 1062.067678] ? find_held_lock+0x2c/0x110 [ 1062.068134] do_filp_open+0x190/0x3e0 [ 1062.068557] ? may_open_dev+0xf0/0xf0 [ 1062.068983] ? alloc_fd+0x2e7/0x670 [ 1062.069385] ? lock_downgrade+0x6d0/0x6d0 [ 1062.069850] ? do_raw_spin_lock+0x121/0x260 [ 1062.070333] ? rwlock_bug.part.0+0x90/0x90 [ 1062.070808] ? _raw_spin_unlock+0x1a/0x30 [ 1062.071269] ? alloc_fd+0x2e7/0x670 [ 1062.071680] do_sys_openat2+0x171/0x4d0 [ 1062.072121] ? __kasan_slab_free+0x122/0x160 [ 1062.072614] ? build_open_flags+0x6f0/0x6f0 [ 1062.073096] ? __x64_sys_mount+0x227/0x300 [ 1062.073574] ? kfree+0xd7/0x340 [ 1062.073944] __x64_sys_openat+0x13f/0x1f0 [ 1062.074421] ? __ia32_sys_open+0x1c0/0x1c0 [ 1062.074893] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.075491] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.076063] do_syscall_64+0x33/0x40 [ 1062.076483] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.077058] RIP: 0033:0x7ff67ee2ea04 [ 1062.077471] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1062.079548] RSP: 002b:00007ff67c3f0f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1062.080389] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff67ee2ea04 [ 1062.081192] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1062.081998] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1062.082789] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1062.083590] R13: 0000000020000380 R14: 00007ff67c3f1000 R15: 0000000020001ac0 15:47:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 20) 15:47:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xff600000, 0x0, 0x0, 0x0, 0x0) [ 1062.084413] CPU: 1 PID: 6586 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1062.086022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1062.086341] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.087741] Call Trace: [ 1062.087761] dump_stack+0x107/0x167 [ 1062.087781] should_fail.cold+0x5/0xa [ 1062.090721] ? create_object.isra.0+0x3a/0xa20 [ 1062.091667] should_failslab+0x5/0x20 [ 1062.092449] kmem_cache_alloc+0x5b/0x310 [ 1062.093294] create_object.isra.0+0x3a/0xa20 [ 1062.094204] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1062.095257] kmem_cache_alloc+0x159/0x310 [ 1062.096114] getname_flags.part.0+0x50/0x4f0 [ 1062.097027] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.098131] getname+0x8e/0xd0 [ 1062.098796] do_sys_openat2+0xf9/0x4d0 [ 1062.099596] ? __kasan_slab_free+0x122/0x160 [ 1062.100503] ? build_open_flags+0x6f0/0x6f0 [ 1062.101397] ? __x64_sys_mount+0x227/0x300 [ 1062.102280] ? kfree+0xd7/0x340 [ 1062.102963] __x64_sys_openat+0x13f/0x1f0 [ 1062.103819] ? __ia32_sys_open+0x1c0/0x1c0 [ 1062.104706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.105792] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.106870] do_syscall_64+0x33/0x40 [ 1062.107644] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.108701] RIP: 0033:0x7fb22feb2a04 [ 1062.109472] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1062.113273] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1062.114849] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1062.116315] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1062.117809] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1062.119294] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1062.120775] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1062.127585] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.132215] FAULT_INJECTION: forcing a failure. [ 1062.132215] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.133490] CPU: 0 PID: 6597 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1062.134260] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1062.135060] FAULT_INJECTION: forcing a failure. [ 1062.135060] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.135181] Call Trace: [ 1062.135201] dump_stack+0x107/0x167 [ 1062.138179] should_fail.cold+0x5/0xa [ 1062.138608] ? create_object.isra.0+0x3a/0xa20 [ 1062.139120] should_failslab+0x5/0x20 [ 1062.139547] kmem_cache_alloc+0x5b/0x310 [ 1062.140005] create_object.isra.0+0x3a/0xa20 [ 1062.140497] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1062.141067] __kmalloc_track_caller+0x177/0x370 [ 1062.141588] ? match_number+0xaf/0x1d0 [ 1062.142041] kmemdup_nul+0x2d/0xa0 [ 1062.142439] match_number+0xaf/0x1d0 [ 1062.142854] ? match_u64+0x190/0x190 [ 1062.143271] ? lock_acquire+0x197/0x470 [ 1062.143713] ? create_object.isra.0+0x3ad/0xa20 [ 1062.144236] parse_options+0x104f/0x24c0 [ 1062.144696] ? clear_qf_name+0x1f0/0x1f0 [ 1062.145153] ? trace_hardirqs_on+0x5b/0x180 [ 1062.145637] ? __kmalloc_track_caller+0x2c6/0x370 [ 1062.146178] ? ext4_remount+0xdf/0x26e0 [ 1062.146618] ? memcpy+0x39/0x60 [ 1062.146989] ext4_remount+0x540/0x26e0 [ 1062.147435] ? ext4_register_li_request+0x8e0/0x8e0 [ 1062.147989] ? do_raw_spin_unlock+0x4f/0x220 [ 1062.148479] ? _raw_spin_unlock+0x1a/0x30 [ 1062.148940] ? shrink_dentry_list+0x134/0x500 [ 1062.149439] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1062.150023] ? shrink_dentry_list+0x500/0x500 [ 1062.150529] ? ext4_register_li_request+0x8e0/0x8e0 [ 1062.151089] legacy_reconfigure+0x11b/0x190 [ 1062.151569] reconfigure_super+0x414/0x9c0 [ 1062.152045] ? fs_umode_to_dtype+0xb0/0xb0 [ 1062.152518] path_mount+0x1ae0/0x2120 [ 1062.152948] ? strncpy_from_user+0x9e/0x470 [ 1062.153430] ? finish_automount+0xa90/0xa90 [ 1062.153911] ? getname_flags.part.0+0x1dd/0x4f0 [ 1062.154444] __x64_sys_mount+0x282/0x300 [ 1062.154898] ? copy_mnt_ns+0xa00/0xa00 [ 1062.155335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.155921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.156494] do_syscall_64+0x33/0x40 [ 1062.156912] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.157483] RIP: 0033:0x7f2f885a504a [ 1062.157900] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1062.159958] RSP: 002b:00007f2f85b18fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1062.160804] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f885a504a [ 1062.161596] RDX: 0000000020000300 RSI: 0000000020000380 RDI: 0000000000000000 [ 1062.162400] RBP: 00007f2f85b19040 R08: 00007f2f85b19040 R09: 0000000020000300 [ 1062.163193] R10: 0000000000388460 R11: 0000000000000206 R12: 0000000020000300 [ 1062.163988] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1062.164813] CPU: 1 PID: 6578 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1062.166258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 15:47:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1062.167993] Call Trace: [ 1062.168709] dump_stack+0x107/0x167 [ 1062.169468] should_fail.cold+0x5/0xa [ 1062.170282] ? security_file_alloc+0x34/0x170 [ 1062.171210] should_failslab+0x5/0x20 [ 1062.171996] kmem_cache_alloc+0x5b/0x310 15:47:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) [ 1062.172904] security_file_alloc+0x34/0x170 [ 1062.173848] __alloc_file+0xb7/0x320 [ 1062.174635] alloc_empty_file+0x6d/0x170 [ 1062.175503] path_openat+0xe6/0x2770 [ 1062.176275] ? __lock_acquire+0x1657/0x5b00 [ 1062.177200] ? path_lookupat+0x860/0x860 [ 1062.178059] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1062.179175] ? lock_acquire+0x197/0x470 [ 1062.180050] ? find_held_lock+0x2c/0x110 [ 1062.181009] do_filp_open+0x190/0x3e0 [ 1062.181802] ? may_open_dev+0xf0/0xf0 [ 1062.182629] ? alloc_fd+0x2e7/0x670 [ 1062.183383] ? lock_downgrade+0x6d0/0x6d0 [ 1062.184256] ? do_raw_spin_lock+0x121/0x260 [ 1062.185149] ? rwlock_bug.part.0+0x90/0x90 [ 1062.186050] ? _raw_spin_unlock+0x1a/0x30 [ 1062.186914] ? alloc_fd+0x2e7/0x670 [ 1062.187686] do_sys_openat2+0x171/0x4d0 [ 1062.188515] ? __kasan_slab_free+0x122/0x160 [ 1062.189439] ? build_open_flags+0x6f0/0x6f0 [ 1062.190352] ? __x64_sys_mount+0x227/0x300 [ 1062.191236] ? kfree+0xd7/0x340 [ 1062.191929] __x64_sys_openat+0x13f/0x1f0 [ 1062.192801] ? __ia32_sys_open+0x1c0/0x1c0 [ 1062.193687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.194797] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.195869] do_syscall_64+0x33/0x40 [ 1062.196651] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.197712] RIP: 0033:0x7ff6a26c5a04 [ 1062.198505] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1062.200005] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.202325] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1062.202344] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1062.202360] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1062.207798] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1062.209296] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1062.210784] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 [ 1062.236458] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.243064] FAULT_INJECTION: forcing a failure. [ 1062.243064] name failslab, interval 1, probability 0, space 0, times 0 [ 1062.244336] CPU: 0 PID: 6600 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1062.245128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1062.246066] Call Trace: [ 1062.246369] dump_stack+0x107/0x167 [ 1062.246780] should_fail.cold+0x5/0xa [ 1062.247223] ? create_object.isra.0+0x3a/0xa20 [ 1062.247745] should_failslab+0x5/0x20 [ 1062.248186] kmem_cache_alloc+0x5b/0x310 [ 1062.248647] create_object.isra.0+0x3a/0xa20 [ 1062.249159] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1062.249729] kmem_cache_alloc+0x159/0x310 [ 1062.250129] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1062.250225] __alloc_file+0x21/0x320 [ 1062.252332] alloc_empty_file+0x6d/0x170 [ 1062.252800] path_openat+0xe6/0x2770 [ 1062.253253] ? __lock_acquire+0x1657/0x5b00 [ 1062.253745] ? path_lookupat+0x860/0x860 [ 1062.254225] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1062.254839] ? lock_acquire+0x197/0x470 [ 1062.255285] ? find_held_lock+0x2c/0x110 [ 1062.255761] do_filp_open+0x190/0x3e0 [ 1062.256189] ? may_open_dev+0xf0/0xf0 [ 1062.256628] ? alloc_fd+0x2e7/0x670 [ 1062.257037] ? lock_downgrade+0x6d0/0x6d0 [ 1062.257510] ? do_raw_spin_lock+0x121/0x260 [ 1062.258003] ? rwlock_bug.part.0+0x90/0x90 [ 1062.258498] ? _raw_spin_unlock+0x1a/0x30 [ 1062.258964] ? alloc_fd+0x2e7/0x670 [ 1062.259393] do_sys_openat2+0x171/0x4d0 [ 1062.259842] ? __kasan_slab_free+0x122/0x160 [ 1062.260344] ? build_open_flags+0x6f0/0x6f0 [ 1062.260829] ? __x64_sys_mount+0x227/0x300 [ 1062.261308] ? kfree+0xd7/0x340 [ 1062.261684] __x64_sys_openat+0x13f/0x1f0 [ 1062.262175] ? __ia32_sys_open+0x1c0/0x1c0 [ 1062.262657] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1062.263261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1062.263841] do_syscall_64+0x33/0x40 [ 1062.264275] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1062.264859] RIP: 0033:0x7f1dc4996a04 [ 1062.265283] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1062.267372] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1062.268256] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1062.269085] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1062.269909] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1062.270739] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1062.271564] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:48:13 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) 15:48:13 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffff000, 0x0, 0x0, 0x0, 0x0) 15:48:13 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) 15:48:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 21) [ 1078.166504] EXT4-fs: 1 callbacks suppressed [ 1078.166519] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.169589] FAULT_INJECTION: forcing a failure. [ 1078.169589] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.172036] CPU: 0 PID: 6611 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1078.173484] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.175236] Call Trace: [ 1078.175810] dump_stack+0x107/0x167 [ 1078.176592] should_fail.cold+0x5/0xa [ 1078.177404] ? getname_flags.part.0+0x50/0x4f0 [ 1078.178355] should_failslab+0x5/0x20 [ 1078.179162] kmem_cache_alloc+0x5b/0x310 [ 1078.180019] getname_flags.part.0+0x50/0x4f0 [ 1078.180959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.182043] getname+0x8e/0xd0 [ 1078.182755] do_sys_openat2+0xf9/0x4d0 [ 1078.183588] ? __kasan_slab_free+0x122/0x160 [ 1078.184518] ? build_open_flags+0x6f0/0x6f0 [ 1078.185434] ? __x64_sys_mount+0x227/0x300 [ 1078.186331] ? kfree+0xd7/0x340 [ 1078.187061] __x64_sys_openat+0x13f/0x1f0 [ 1078.187960] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.188875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.189984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.191083] do_syscall_64+0x33/0x40 [ 1078.191884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.192955] RIP: 0033:0x7f2f88556a04 [ 1078.193748] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.197592] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.199209] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1078.200708] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.202212] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.203722] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.205255] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:48:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) 15:48:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) [ 1078.207999] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.210780] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.215865] FAULT_INJECTION: forcing a failure. [ 1078.215865] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.218334] CPU: 1 PID: 6617 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1078.219814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.221598] Call Trace: [ 1078.222197] dump_stack+0x107/0x167 [ 1078.223017] should_fail.cold+0x5/0xa [ 1078.223812] ? create_object.isra.0+0x3a/0xa20 [ 1078.224765] should_failslab+0x5/0x20 [ 1078.225562] kmem_cache_alloc+0x5b/0x310 [ 1078.226405] create_object.isra.0+0x3a/0xa20 [ 1078.227377] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1078.228493] kmem_cache_alloc+0x159/0x310 [ 1078.229377] getname_flags.part.0+0x50/0x4f0 [ 1078.230305] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.231462] getname+0x8e/0xd0 [ 1078.232134] do_sys_openat2+0xf9/0x4d0 [ 1078.232944] ? __kasan_slab_free+0x122/0x160 [ 1078.233858] ? build_open_flags+0x6f0/0x6f0 [ 1078.234394] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.234821] ? __x64_sys_mount+0x227/0x300 [ 1078.234848] ? kfree+0xd7/0x340 [ 1078.234882] __x64_sys_openat+0x13f/0x1f0 [ 1078.240072] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.241159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.242568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.242699] FAULT_INJECTION: forcing a failure. [ 1078.242699] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.243981] do_syscall_64+0x33/0x40 [ 1078.244019] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.249027] RIP: 0033:0x7fb22feb2a04 [ 1078.250031] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.254823] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.256729] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1078.258565] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.260430] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.262260] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.263901] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1078.265443] CPU: 0 PID: 6621 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1078.267267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.269430] Call Trace: [ 1078.270124] dump_stack+0x107/0x167 [ 1078.271097] should_fail.cold+0x5/0xa [ 1078.272090] ? create_object.isra.0+0x3a/0xa20 [ 1078.273285] should_failslab+0x5/0x20 [ 1078.274285] kmem_cache_alloc+0x5b/0x310 [ 1078.275376] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1078.276811] create_object.isra.0+0x3a/0xa20 [ 1078.277950] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1078.279263] kmem_cache_alloc+0x159/0x310 [ 1078.280349] security_file_alloc+0x34/0x170 [ 1078.281449] __alloc_file+0xb7/0x320 [ 1078.282425] alloc_empty_file+0x6d/0x170 [ 1078.283353] path_openat+0xe6/0x2770 [ 1078.284145] ? __lock_acquire+0x1657/0x5b00 [ 1078.285074] ? path_lookupat+0x860/0x860 [ 1078.285952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1078.287079] ? lock_acquire+0x197/0x470 [ 1078.287929] ? find_held_lock+0x2c/0x110 [ 1078.288809] do_filp_open+0x190/0x3e0 [ 1078.289622] ? may_open_dev+0xf0/0xf0 [ 1078.290417] ? alloc_fd+0x2e7/0x670 [ 1078.291201] ? lock_downgrade+0x6d0/0x6d0 [ 1078.292071] ? do_raw_spin_lock+0x121/0x260 [ 1078.292974] ? rwlock_bug.part.0+0x90/0x90 [ 1078.293878] ? _raw_spin_unlock+0x1a/0x30 [ 1078.294753] ? alloc_fd+0x2e7/0x670 [ 1078.295525] do_sys_openat2+0x171/0x4d0 [ 1078.296346] ? __kasan_slab_free+0x122/0x160 [ 1078.297281] ? build_open_flags+0x6f0/0x6f0 [ 1078.298187] ? __x64_sys_mount+0x227/0x300 [ 1078.299076] ? kfree+0xd7/0x340 [ 1078.299789] __x64_sys_openat+0x13f/0x1f0 [ 1078.300669] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.301562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.302677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.303767] do_syscall_64+0x33/0x40 [ 1078.304544] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.305610] RIP: 0033:0x7ff6a26c5a04 [ 1078.306390] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.310313] RSP: 002b:00007ff69fc87f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.311924] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff6a26c5a04 [ 1078.313407] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.314903] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.316433] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.317941] R13: 0000000020000380 R14: 00007ff69fc88000 R15: 0000000020001ac0 15:48:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) [ 1078.331943] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.334478] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.337908] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.340607] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.344301] FAULT_INJECTION: forcing a failure. [ 1078.344301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1078.344514] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.347057] CPU: 1 PID: 6624 Comm: syz-executor.0 Not tainted 5.10.233 #1 [ 1078.350155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.351957] Call Trace: [ 1078.352522] dump_stack+0x107/0x167 [ 1078.353287] should_fail.cold+0x5/0xa [ 1078.354108] _copy_to_user+0x2e/0x180 [ 1078.354928] simple_read_from_buffer+0xcc/0x160 [ 1078.355918] proc_fail_nth_read+0x198/0x230 [ 1078.356837] ? proc_sessionid_read+0x230/0x230 [ 1078.357804] ? security_file_permission+0xb1/0xe0 [ 1078.358839] ? proc_sessionid_read+0x230/0x230 [ 1078.359787] vfs_read+0x228/0x620 [ 1078.360533] ksys_read+0x12d/0x260 [ 1078.361301] ? vfs_write+0xb10/0xb10 [ 1078.362096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.363222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.364342] do_syscall_64+0x33/0x40 [ 1078.365132] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.366219] RIP: 0033:0x7ff67ee2e69c 15:48:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) [ 1078.367029] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1078.371013] RSP: 002b:00007ff67c3f1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1078.372602] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007ff67ee2e69c [ 1078.374088] RDX: 000000000000000f RSI: 00007ff67c3f11e0 RDI: 0000000000000003 [ 1078.375591] RBP: 00007ff67c3f11d0 R08: 0000000000000000 R09: 0000000020000300 [ 1078.377129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1078.378654] R13: 00007fff33e2016f R14: 00007ff67c3f1300 R15: 0000000000022000 [ 1078.390918] FAULT_INJECTION: forcing a failure. [ 1078.390918] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.393371] CPU: 1 PID: 6623 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1078.394852] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.396627] Call Trace: [ 1078.397195] dump_stack+0x107/0x167 [ 1078.397967] should_fail.cold+0x5/0xa [ 1078.398776] ? security_file_alloc+0x34/0x170 [ 1078.399712] should_failslab+0x5/0x20 [ 1078.400508] kmem_cache_alloc+0x5b/0x310 [ 1078.401378] security_file_alloc+0x34/0x170 [ 1078.402292] __alloc_file+0xb7/0x320 [ 1078.403075] alloc_empty_file+0x6d/0x170 [ 1078.403948] path_openat+0xe6/0x2770 [ 1078.404755] ? __lock_acquire+0x1657/0x5b00 [ 1078.405686] ? path_lookupat+0x860/0x860 [ 1078.406558] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1078.407649] ? lock_acquire+0x197/0x470 [ 1078.408496] ? find_held_lock+0x2c/0x110 [ 1078.409351] do_filp_open+0x190/0x3e0 [ 1078.410139] ? may_open_dev+0xf0/0xf0 [ 1078.410944] ? alloc_fd+0x2e7/0x670 [ 1078.411712] ? lock_downgrade+0x6d0/0x6d0 [ 1078.412578] ? do_raw_spin_lock+0x121/0x260 [ 1078.413474] ? rwlock_bug.part.0+0x90/0x90 [ 1078.414354] ? _raw_spin_unlock+0x1a/0x30 [ 1078.415224] ? alloc_fd+0x2e7/0x670 [ 1078.415998] do_sys_openat2+0x171/0x4d0 [ 1078.416837] ? __kasan_slab_free+0x122/0x160 [ 1078.417753] ? build_open_flags+0x6f0/0x6f0 [ 1078.418657] ? __x64_sys_mount+0x227/0x300 [ 1078.419534] ? kfree+0xd7/0x340 [ 1078.420226] __x64_sys_openat+0x13f/0x1f0 [ 1078.421087] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.421979] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.423090] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.424186] do_syscall_64+0x33/0x40 [ 1078.424971] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.426035] RIP: 0033:0x7f1dc4996a04 [ 1078.426821] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.430675] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.432258] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1078.433750] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.435250] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.436727] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.438221] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 15:48:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) 15:48:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffa1, 0x0, 0x0, 0x0, 0x0) 15:48:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 22) 15:48:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1078.517442] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1078.537864] FAULT_INJECTION: forcing a failure. [ 1078.537864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1078.540445] CPU: 1 PID: 6636 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1078.541875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.543618] Call Trace: [ 1078.544177] dump_stack+0x107/0x167 [ 1078.544937] should_fail.cold+0x5/0xa [ 1078.545731] strncpy_from_user+0x34/0x470 [ 1078.546615] getname_flags.part.0+0x95/0x4f0 [ 1078.547533] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.548623] getname+0x8e/0xd0 [ 1078.549307] do_sys_openat2+0xf9/0x4d0 [ 1078.550122] ? __kasan_slab_free+0x122/0x160 [ 1078.551045] ? build_open_flags+0x6f0/0x6f0 [ 1078.551937] ? __x64_sys_mount+0x227/0x300 [ 1078.552822] ? kfree+0xd7/0x340 [ 1078.553511] __x64_sys_openat+0x13f/0x1f0 [ 1078.554370] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.555267] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.556362] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.557440] do_syscall_64+0x33/0x40 [ 1078.558209] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.559283] RIP: 0033:0x7fb22feb2a04 [ 1078.560056] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.564195] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.565783] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1078.567281] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.568776] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.570264] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.571752] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1078.591273] FAULT_INJECTION: forcing a failure. [ 1078.591273] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.593753] CPU: 1 PID: 6643 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1078.595183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1078.596946] Call Trace: [ 1078.597501] dump_stack+0x107/0x167 [ 1078.598264] should_fail.cold+0x5/0xa [ 1078.599077] ? create_object.isra.0+0x3a/0xa20 [ 1078.600036] should_failslab+0x5/0x20 [ 1078.600838] kmem_cache_alloc+0x5b/0x310 [ 1078.601693] create_object.isra.0+0x3a/0xa20 [ 1078.602615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1078.603691] kmem_cache_alloc+0x159/0x310 [ 1078.604557] getname_flags.part.0+0x50/0x4f0 [ 1078.605475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.606579] getname+0x8e/0xd0 [ 1078.607255] do_sys_openat2+0xf9/0x4d0 [ 1078.608086] ? __kasan_slab_free+0x122/0x160 [ 1078.609011] ? build_open_flags+0x6f0/0x6f0 [ 1078.609927] ? __x64_sys_mount+0x227/0x300 [ 1078.610814] ? kfree+0xd7/0x340 [ 1078.611516] __x64_sys_openat+0x13f/0x1f0 [ 1078.612382] ? __ia32_sys_open+0x1c0/0x1c0 [ 1078.613272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1078.614365] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1078.615452] do_syscall_64+0x33/0x40 [ 1078.616225] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1078.617288] RIP: 0033:0x7f2f88556a04 [ 1078.618069] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1078.621928] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1078.623522] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1078.625013] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1078.626501] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1078.628012] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1078.629509] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:48:27 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) 15:48:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 23) 15:48:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffe4, 0x0, 0x0, 0x0, 0x0) 15:48:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) 15:48:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) [ 1091.791097] EXT4-fs: 6 callbacks suppressed [ 1091.791139] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.799348] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.821312] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.827033] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.829145] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.831304] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.833287] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.835281] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.838495] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.840380] FAULT_INJECTION: forcing a failure. [ 1091.840380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.842143] FAULT_INJECTION: forcing a failure. [ 1091.842143] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.842962] CPU: 1 PID: 6663 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1091.847026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.848720] Call Trace: [ 1091.849271] dump_stack+0x107/0x167 [ 1091.850032] should_fail.cold+0x5/0xa [ 1091.850811] __alloc_pages_nodemask+0x182/0x600 [ 1091.851784] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1091.853147] ? kmem_cache_alloc+0x301/0x310 [ 1091.854046] alloc_pages_current+0x187/0x280 [ 1091.854975] allocate_slab+0x26f/0x380 [ 1091.855802] ___slab_alloc+0x470/0x700 [ 1091.856611] ? getname_flags.part.0+0x50/0x4f0 [ 1091.857567] ? getname_flags.part.0+0x50/0x4f0 [ 1091.858520] ? kmem_cache_alloc+0x301/0x310 [ 1091.859428] kmem_cache_alloc+0x301/0x310 [ 1091.860289] getname_flags.part.0+0x50/0x4f0 [ 1091.861203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.862294] getname+0x8e/0xd0 [ 1091.862975] do_sys_openat2+0xf9/0x4d0 [ 1091.863805] ? __kasan_slab_free+0x122/0x160 [ 1091.864735] ? build_open_flags+0x6f0/0x6f0 [ 1091.865639] ? __x64_sys_mount+0x227/0x300 [ 1091.866537] ? kfree+0xd7/0x340 [ 1091.867247] __x64_sys_openat+0x13f/0x1f0 [ 1091.868122] ? __ia32_sys_open+0x1c0/0x1c0 [ 1091.869019] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.870125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1091.871222] do_syscall_64+0x33/0x40 [ 1091.872013] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.873074] RIP: 0033:0x7f2f88556a04 [ 1091.873860] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1091.877749] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1091.879385] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1091.880898] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1091.882408] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1091.883958] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1091.885465] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1091.887049] CPU: 0 PID: 6654 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1091.888550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.890311] Call Trace: [ 1091.890876] dump_stack+0x107/0x167 [ 1091.891653] should_fail.cold+0x5/0xa [ 1091.891679] FAULT_INJECTION: forcing a failure. [ 1091.891679] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.892459] ? __alloc_file+0x21/0x320 [ 1091.892484] should_failslab+0x5/0x20 [ 1091.892510] kmem_cache_alloc+0x5b/0x310 [ 1091.897260] __alloc_file+0x21/0x320 [ 1091.898045] alloc_empty_file+0x6d/0x170 [ 1091.899413] path_openat+0xe6/0x2770 [ 1091.900430] ? __lock_acquire+0x1657/0x5b00 [ 1091.901488] ? path_lookupat+0x860/0x860 [ 1091.902447] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1091.903650] ? lock_acquire+0x197/0x470 [ 1091.904520] ? find_held_lock+0x2c/0x110 [ 1091.905424] do_filp_open+0x190/0x3e0 [ 1091.906256] ? may_open_dev+0xf0/0xf0 [ 1091.907117] ? alloc_fd+0x2e7/0x670 [ 1091.907914] ? lock_downgrade+0x6d0/0x6d0 [ 1091.908854] ? do_raw_spin_lock+0x121/0x260 [ 1091.909825] ? rwlock_bug.part.0+0x90/0x90 [ 1091.910788] ? _raw_spin_unlock+0x1a/0x30 [ 1091.911867] ? alloc_fd+0x2e7/0x670 [ 1091.912745] do_sys_openat2+0x171/0x4d0 [ 1091.913759] ? __kasan_slab_free+0x122/0x160 [ 1091.914868] ? build_open_flags+0x6f0/0x6f0 [ 1091.915968] ? __x64_sys_mount+0x227/0x300 [ 1091.917028] ? kfree+0xd7/0x340 [ 1091.917862] __x64_sys_openat+0x13f/0x1f0 [ 1091.918901] ? __ia32_sys_open+0x1c0/0x1c0 [ 1091.919987] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.921303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1091.922600] do_syscall_64+0x33/0x40 [ 1091.923541] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.924685] RIP: 0033:0x7fb22feb2a04 [ 1091.925505] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1091.929814] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1091.931422] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1091.932915] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1091.934686] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1091.936201] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1091.937691] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1091.939236] CPU: 1 PID: 6662 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1091.940375] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1091.940997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1091.941006] Call Trace: [ 1091.941040] dump_stack+0x107/0x167 [ 1091.941068] should_fail.cold+0x5/0xa [ 1091.944096] FAULT_INJECTION: forcing a failure. [ 1091.944096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1091.944891] ? security_file_alloc+0x34/0x170 [ 1091.944921] should_failslab+0x5/0x20 [ 1091.944951] kmem_cache_alloc+0x5b/0x310 [ 1091.953240] security_file_alloc+0x34/0x170 [ 1091.954351] __alloc_file+0xb7/0x320 [ 1091.955327] alloc_empty_file+0x6d/0x170 [ 1091.956363] path_openat+0xe6/0x2770 [ 1091.957313] ? __lock_acquire+0x1657/0x5b00 [ 1091.958436] ? path_lookupat+0x860/0x860 [ 1091.959499] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1091.960839] ? lock_acquire+0x197/0x470 [ 1091.961855] ? find_held_lock+0x2c/0x110 [ 1091.962897] do_filp_open+0x190/0x3e0 [ 1091.963875] ? may_open_dev+0xf0/0xf0 [ 1091.964842] ? alloc_fd+0x2e7/0x670 [ 1091.965762] ? lock_downgrade+0x6d0/0x6d0 [ 1091.966805] ? do_raw_spin_lock+0x121/0x260 [ 1091.967903] ? rwlock_bug.part.0+0x90/0x90 [ 1091.968981] ? _raw_spin_unlock+0x1a/0x30 [ 1091.970022] ? alloc_fd+0x2e7/0x670 [ 1091.970957] do_sys_openat2+0x171/0x4d0 [ 1091.971977] ? __kasan_slab_free+0x122/0x160 [ 1091.973105] ? build_open_flags+0x6f0/0x6f0 [ 1091.974233] ? __x64_sys_mount+0x227/0x300 [ 1091.975336] ? kfree+0xd7/0x340 [ 1091.976195] __x64_sys_openat+0x13f/0x1f0 [ 1091.977254] ? __ia32_sys_open+0x1c0/0x1c0 [ 1091.978334] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1091.979697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1091.981032] do_syscall_64+0x33/0x40 [ 1091.981979] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1091.983286] RIP: 0033:0x7f1dc4996a04 [ 1091.984230] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1091.988896] RSP: 002b:00007f1dc1f58f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1091.990824] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1dc4996a04 [ 1091.992641] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1091.994438] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1091.996249] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1091.998048] R13: 0000000020000380 R14: 00007f1dc1f59000 R15: 0000000020001ac0 [ 1091.999891] CPU: 0 PID: 6665 Comm: syz-executor.6 Not tainted 5.10.233 #1 [ 1092.001703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1092.003474] Call Trace: [ 1092.004034] dump_stack+0x107/0x167 [ 1092.004800] should_fail.cold+0x5/0xa [ 1092.005606] _copy_to_user+0x2e/0x180 [ 1092.006412] simple_read_from_buffer+0xcc/0x160 [ 1092.007400] proc_fail_nth_read+0x198/0x230 [ 1092.008437] ? proc_sessionid_read+0x230/0x230 [ 1092.009420] ? security_file_permission+0xb1/0xe0 [ 1092.010467] ? proc_sessionid_read+0x230/0x230 [ 1092.011463] vfs_read+0x228/0x620 [ 1092.012220] ksys_read+0x12d/0x260 [ 1092.012988] ? vfs_write+0xb10/0xb10 [ 1092.013803] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1092.014938] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1092.016071] do_syscall_64+0x33/0x40 [ 1092.016879] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.017983] RIP: 0033:0x7ff6a26c569c [ 1092.018786] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1092.024039] RSP: 002b:00007ff69fc88170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1092.026023] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007ff6a26c569c [ 1092.027902] RDX: 000000000000000f RSI: 00007ff69fc881e0 RDI: 0000000000000003 [ 1092.029843] RBP: 00007ff69fc881d0 R08: 0000000000000000 R09: 0000000020000300 [ 1092.031530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.033209] R13: 00007fffb2e9909f R14: 00007ff69fc88300 R15: 0000000000022000 15:48:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffff0, 0x0, 0x0, 0x0, 0x0) 15:48:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 24) 15:48:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1092.129678] FAULT_INJECTION: forcing a failure. [ 1092.129678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1092.132237] CPU: 0 PID: 6674 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1092.133658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1092.135385] Call Trace: [ 1092.135933] dump_stack+0x107/0x167 [ 1092.136688] should_fail.cold+0x5/0xa [ 1092.137487] strncpy_from_user+0x34/0x470 [ 1092.138353] getname_flags.part.0+0x95/0x4f0 [ 1092.139275] getname+0x8e/0xd0 [ 1092.139944] do_sys_openat2+0xf9/0x4d0 [ 1092.140749] ? finish_task_switch+0xef/0x5d0 [ 1092.141649] ? __switch_to+0x572/0xf70 [ 1092.142465] ? __switch_to_asm+0x3a/0x60 [ 1092.143327] ? build_open_flags+0x6f0/0x6f0 [ 1092.144226] ? __schedule+0x82c/0x1ea0 [ 1092.145045] __x64_sys_openat+0x13f/0x1f0 [ 1092.145908] ? __ia32_sys_open+0x1c0/0x1c0 [ 1092.146798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1092.147893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1092.148970] do_syscall_64+0x33/0x40 [ 1092.149745] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1092.150805] RIP: 0033:0x7f2f88556a04 [ 1092.151579] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1092.155417] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1092.156987] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1092.158459] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1092.159945] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1092.161418] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1092.162975] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 15:48:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffff4, 0x0, 0x0, 0x0, 0x0) 15:48:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 15:48:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) 15:48:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 25) 15:48:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) 15:48:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1109.508543] EXT4-fs: 11 callbacks suppressed [ 1109.508559] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.511956] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.517448] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.521692] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.529853] FAULT_INJECTION: forcing a failure. [ 1109.529853] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.532363] CPU: 1 PID: 6709 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1109.533835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.535625] Call Trace: [ 1109.536196] dump_stack+0x107/0x167 [ 1109.536489] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.536975] should_fail.cold+0x5/0xa [ 1109.536997] ? security_file_alloc+0x34/0x170 [ 1109.537028] should_failslab+0x5/0x20 [ 1109.541672] kmem_cache_alloc+0x5b/0x310 [ 1109.542551] security_file_alloc+0x34/0x170 [ 1109.543477] __alloc_file+0xb7/0x320 [ 1109.544306] alloc_empty_file+0x6d/0x170 [ 1109.545183] path_openat+0xe6/0x2770 [ 1109.545644] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.545977] ? __lock_acquire+0x1657/0x5b00 [ 1109.546006] ? path_lookupat+0x860/0x860 [ 1109.546028] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1109.546058] ? lock_acquire+0x197/0x470 [ 1109.551845] FAULT_INJECTION: forcing a failure. [ 1109.551845] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.551863] ? find_held_lock+0x2c/0x110 [ 1109.551895] do_filp_open+0x190/0x3e0 [ 1109.556345] ? may_open_dev+0xf0/0xf0 [ 1109.557160] ? alloc_fd+0x2e7/0x670 [ 1109.557936] ? lock_downgrade+0x6d0/0x6d0 [ 1109.558819] ? do_raw_spin_lock+0x121/0x260 [ 1109.559747] ? rwlock_bug.part.0+0x90/0x90 [ 1109.560657] ? _raw_spin_unlock+0x1a/0x30 [ 1109.561537] ? alloc_fd+0x2e7/0x670 [ 1109.562325] do_sys_openat2+0x171/0x4d0 [ 1109.563173] ? __kasan_slab_free+0x122/0x160 [ 1109.564126] ? build_open_flags+0x6f0/0x6f0 [ 1109.565055] ? __x64_sys_mount+0x227/0x300 [ 1109.565956] ? kfree+0xd7/0x340 [ 1109.566668] __x64_sys_openat+0x13f/0x1f0 [ 1109.567553] ? __ia32_sys_open+0x1c0/0x1c0 [ 1109.568472] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.569597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.570700] do_syscall_64+0x33/0x40 [ 1109.571497] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1109.572602] RIP: 0033:0x7fb22feb2a04 [ 1109.573399] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1109.577342] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1109.578969] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1109.580503] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1109.581928] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1109.583471] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1109.585229] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 [ 1109.586761] CPU: 0 PID: 6712 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1109.588506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.589796] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.590499] Call Trace: [ 1109.592829] dump_stack+0x107/0x167 [ 1109.593648] should_fail.cold+0x5/0xa [ 1109.594450] ? create_object.isra.0+0x3a/0xa20 [ 1109.595425] should_failslab+0x5/0x20 [ 1109.596238] kmem_cache_alloc+0x5b/0x310 [ 1109.597082] create_object.isra.0+0x3a/0xa20 [ 1109.598025] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1109.599287] kmem_cache_alloc+0x159/0x310 [ 1109.600359] __alloc_file+0x21/0x320 [ 1109.601306] alloc_empty_file+0x6d/0x170 [ 1109.602343] path_openat+0xe6/0x2770 [ 1109.603295] ? __lock_acquire+0x1657/0x5b00 [ 1109.604414] ? path_lookupat+0x860/0x860 [ 1109.605454] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1109.606780] ? lock_acquire+0x197/0x470 [ 1109.607792] ? find_held_lock+0x2c/0x110 [ 1109.608835] do_filp_open+0x190/0x3e0 [ 1109.609752] ? may_open_dev+0xf0/0xf0 [ 1109.610778] ? alloc_fd+0x2e7/0x670 [ 1109.611711] ? lock_downgrade+0x6d0/0x6d0 [ 1109.612773] ? do_raw_spin_lock+0x121/0x260 [ 1109.613926] ? rwlock_bug.part.0+0x90/0x90 [ 1109.614964] ? _raw_spin_unlock+0x1a/0x30 [ 1109.615979] ? alloc_fd+0x2e7/0x670 [ 1109.616865] do_sys_openat2+0x171/0x4d0 [ 1109.617810] ? __kasan_slab_free+0x122/0x160 [ 1109.618848] ? build_open_flags+0x6f0/0x6f0 [ 1109.619885] ? __x64_sys_mount+0x227/0x300 [ 1109.620818] ? kfree+0xd7/0x340 [ 1109.621521] __x64_sys_openat+0x13f/0x1f0 [ 1109.622385] ? __ia32_sys_open+0x1c0/0x1c0 [ 1109.623281] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.624390] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.625459] do_syscall_64+0x33/0x40 [ 1109.626231] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1109.627300] RIP: 0033:0x7f2f88556a04 [ 1109.628093] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1109.631929] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1109.633526] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1109.635007] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1109.636503] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1109.638000] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1109.639477] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1109.642268] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.648010] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1109.674023] FAULT_INJECTION: forcing a failure. [ 1109.674023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1109.676475] CPU: 0 PID: 6711 Comm: syz-executor.5 Not tainted 5.10.233 #1 [ 1109.677891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.679603] Call Trace: [ 1109.680160] dump_stack+0x107/0x167 [ 1109.680916] should_fail.cold+0x5/0xa [ 1109.681711] _copy_to_user+0x2e/0x180 [ 1109.682506] simple_read_from_buffer+0xcc/0x160 [ 1109.683474] proc_fail_nth_read+0x198/0x230 15:48:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0) [ 1109.684378] ? proc_sessionid_read+0x230/0x230 [ 1109.685448] ? security_file_permission+0xb1/0xe0 [ 1109.686456] ? proc_sessionid_read+0x230/0x230 [ 1109.687403] vfs_read+0x228/0x620 [ 1109.688140] ksys_read+0x12d/0x260 [ 1109.688878] ? vfs_write+0xb10/0xb10 [ 1109.689656] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.690743] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.691825] do_syscall_64+0x33/0x40 [ 1109.692596] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1109.693658] RIP: 0033:0x7f1dc499669c [ 1109.694434] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1109.698259] RSP: 002b:00007f1dc1f59170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1109.699848] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f1dc499669c [ 1109.701327] RDX: 000000000000000f RSI: 00007f1dc1f591e0 RDI: 0000000000000003 [ 1109.702809] RBP: 00007f1dc1f591d0 R08: 0000000000000000 R09: 0000000020000300 [ 1109.704294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1109.705777] R13: 00007ffd9ae2b7ff R14: 00007f1dc1f59300 R15: 0000000000022000 [ 1109.709179] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:48:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) 15:48:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 26) 15:48:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0) 15:48:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1109.851814] FAULT_INJECTION: forcing a failure. [ 1109.851814] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.854180] CPU: 0 PID: 6733 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1109.855722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.857215] FAULT_INJECTION: forcing a failure. [ 1109.857215] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.857669] Call Trace: [ 1109.857714] dump_stack+0x107/0x167 [ 1109.861935] should_fail.cold+0x5/0xa [ 1109.862832] ? security_file_alloc+0x34/0x170 [ 1109.863906] should_failslab+0x5/0x20 [ 1109.864791] kmem_cache_alloc+0x5b/0x310 [ 1109.865753] security_file_alloc+0x34/0x170 [ 1109.866785] __alloc_file+0xb7/0x320 [ 1109.867687] alloc_empty_file+0x6d/0x170 [ 1109.868660] path_openat+0xe6/0x2770 [ 1109.869566] ? __lock_acquire+0x1657/0x5b00 [ 1109.870617] ? path_lookupat+0x860/0x860 [ 1109.871595] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1109.872849] ? lock_acquire+0x197/0x470 [ 1109.873806] ? find_held_lock+0x2c/0x110 [ 1109.874801] do_filp_open+0x190/0x3e0 [ 1109.875723] ? may_open_dev+0xf0/0xf0 [ 1109.876618] ? alloc_fd+0x2e7/0x670 [ 1109.877622] ? lock_downgrade+0x6d0/0x6d0 [ 1109.878629] ? do_raw_spin_lock+0x121/0x260 [ 1109.879704] ? rwlock_bug.part.0+0x90/0x90 [ 1109.880787] ? _raw_spin_unlock+0x1a/0x30 [ 1109.881858] ? alloc_fd+0x2e7/0x670 [ 1109.882822] do_sys_openat2+0x171/0x4d0 [ 1109.883876] ? __kasan_slab_free+0x122/0x160 [ 1109.885015] ? build_open_flags+0x6f0/0x6f0 [ 1109.886141] ? __x64_sys_mount+0x227/0x300 [ 1109.887247] ? kfree+0xd7/0x340 [ 1109.888133] __x64_sys_openat+0x13f/0x1f0 [ 1109.889219] ? __ia32_sys_open+0x1c0/0x1c0 [ 1109.890331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.891707] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.893056] do_syscall_64+0x33/0x40 [ 1109.894031] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1109.895363] RIP: 0033:0x7f2f88556a04 [ 1109.896353] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1109.901152] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1109.903128] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1109.904823] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1109.906346] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1109.907884] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1109.909407] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1109.910980] CPU: 1 PID: 6727 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1109.912842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1109.914982] Call Trace: [ 1109.915699] dump_stack+0x107/0x167 [ 1109.916646] should_fail.cold+0x5/0xa [ 1109.917635] ? __alloc_file+0x21/0x320 [ 1109.918651] should_failslab+0x5/0x20 [ 1109.919661] kmem_cache_alloc+0x5b/0x310 [ 1109.920742] __alloc_file+0x21/0x320 15:48:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1109.921710] alloc_empty_file+0x6d/0x170 [ 1109.923015] path_openat+0xe6/0x2770 [ 1109.924003] ? __lock_acquire+0x1657/0x5b00 [ 1109.925130] ? path_lookupat+0x860/0x860 [ 1109.926202] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1109.927568] ? lock_acquire+0x197/0x470 [ 1109.928622] ? find_held_lock+0x2c/0x110 [ 1109.929692] do_filp_open+0x190/0x3e0 [ 1109.930680] ? may_open_dev+0xf0/0xf0 [ 1109.931706] ? alloc_fd+0x2e7/0x670 [ 1109.932663] ? lock_downgrade+0x6d0/0x6d0 [ 1109.933734] ? do_raw_spin_lock+0x121/0x260 [ 1109.934854] ? rwlock_bug.part.0+0x90/0x90 [ 1109.935995] ? _raw_spin_unlock+0x1a/0x30 [ 1109.937090] ? alloc_fd+0x2e7/0x670 [ 1109.938046] do_sys_openat2+0x171/0x4d0 [ 1109.939110] ? __kasan_slab_free+0x122/0x160 [ 1109.940274] ? build_open_flags+0x6f0/0x6f0 [ 1109.941409] ? __x64_sys_mount+0x227/0x300 [ 1109.942509] ? kfree+0xd7/0x340 [ 1109.943387] __x64_sys_openat+0x13f/0x1f0 [ 1109.944590] ? __ia32_sys_open+0x1c0/0x1c0 [ 1109.945878] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1109.947215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1109.948537] do_syscall_64+0x33/0x40 [ 1109.949454] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1109.950724] RIP: 0033:0x7fb22feb2a04 [ 1109.951664] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1109.956139] RSP: 002b:00007fb22d474f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1109.957911] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb22feb2a04 [ 1109.959597] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1109.961228] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1109.962883] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1109.964520] R13: 0000000020000380 R14: 00007fb22d475000 R15: 0000000020001ac0 15:48:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) 15:48:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000000000, 0x0, 0x0, 0x0, 0x0) 15:48:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 27) [ 1123.953154] EXT4-fs: 15 callbacks suppressed [ 1123.953190] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.958573] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.966569] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.979818] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.982159] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.992280] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.994471] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.997358] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1123.997431] FAULT_INJECTION: forcing a failure. [ 1123.997431] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.000590] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1124.001785] CPU: 1 PID: 6763 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1124.004176] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1124.005041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.005048] Call Trace: [ 1124.005071] dump_stack+0x107/0x167 [ 1124.005096] should_fail.cold+0x5/0xa [ 1124.009403] FAULT_INJECTION: forcing a failure. [ 1124.009403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1124.009984] ? create_object.isra.0+0x3a/0xa20 [ 1124.010013] should_failslab+0x5/0x20 [ 1124.015040] kmem_cache_alloc+0x5b/0x310 [ 1124.015912] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1124.017097] create_object.isra.0+0x3a/0xa20 [ 1124.018036] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1124.019127] kmem_cache_alloc+0x159/0x310 [ 1124.020020] security_file_alloc+0x34/0x170 [ 1124.020953] __alloc_file+0xb7/0x320 [ 1124.021749] alloc_empty_file+0x6d/0x170 [ 1124.022619] path_openat+0xe6/0x2770 [ 1124.023416] ? __lock_acquire+0x1657/0x5b00 [ 1124.024354] ? path_lookupat+0x860/0x860 [ 1124.025226] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1124.026346] ? lock_acquire+0x197/0x470 [ 1124.027194] ? find_held_lock+0x2c/0x110 [ 1124.028072] do_filp_open+0x190/0x3e0 [ 1124.028893] ? may_open_dev+0xf0/0xf0 [ 1124.029711] ? alloc_fd+0x2e7/0x670 [ 1124.030491] ? lock_downgrade+0x6d0/0x6d0 [ 1124.031373] ? do_raw_spin_lock+0x121/0x260 [ 1124.032301] ? rwlock_bug.part.0+0x90/0x90 [ 1124.033211] ? _raw_spin_unlock+0x1a/0x30 [ 1124.034094] ? alloc_fd+0x2e7/0x670 [ 1124.034881] do_sys_openat2+0x171/0x4d0 [ 1124.035733] ? __kasan_slab_free+0x122/0x160 [ 1124.036679] ? build_open_flags+0x6f0/0x6f0 [ 1124.037604] ? __x64_sys_mount+0x227/0x300 [ 1124.038507] ? kfree+0xd7/0x340 [ 1124.039217] __x64_sys_openat+0x13f/0x1f0 [ 1124.040113] ? __ia32_sys_open+0x1c0/0x1c0 [ 1124.041028] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.042152] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.043256] do_syscall_64+0x33/0x40 [ 1124.044049] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.045157] RIP: 0033:0x7f2f88556a04 [ 1124.045949] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1124.049886] RSP: 002b:00007f2f85b18f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1124.051513] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f88556a04 [ 1124.053044] RDX: 0000000000010000 RSI: 0000000020000380 RDI: 00000000ffffff9c [ 1124.054574] RBP: 0000000020000380 R08: 0000000000000000 R09: 0000000020000300 [ 1124.056098] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1124.057645] R13: 0000000020000380 R14: 00007f2f85b19000 R15: 0000000020001ac0 [ 1124.059203] CPU: 0 PID: 6767 Comm: syz-executor.1 Not tainted 5.10.233 #1 [ 1124.060708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1124.062491] Call Trace: [ 1124.063066] dump_stack+0x107/0x167 [ 1124.063852] should_fail.cold+0x5/0xa [ 1124.064695] _copy_to_user+0x2e/0x180 [ 1124.065530] simple_read_from_buffer+0xcc/0x160 [ 1124.066536] proc_fail_nth_read+0x198/0x230 [ 1124.067467] ? proc_sessionid_read+0x230/0x230 [ 1124.068464] ? security_file_permission+0xb1/0xe0 [ 1124.069513] ? proc_sessionid_read+0x230/0x230 [ 1124.070496] vfs_read+0x228/0x620 [ 1124.071252] ksys_read+0x12d/0x260 [ 1124.072019] ? vfs_write+0xb10/0xb10 [ 1124.072843] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1124.074103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1124.075407] do_syscall_64+0x33/0x40 [ 1124.076362] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1124.077655] RIP: 0033:0x7fb22feb269c [ 1124.078594] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1124.083319] RSP: 002b:00007fb22d475170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1124.085247] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fb22feb269c [ 1124.087044] RDX: 000000000000000f RSI: 00007fb22d4751e0 RDI: 0000000000000003 [ 1124.088851] RBP: 00007fb22d4751d0 R08: 0000000000000000 R09: 0000000020000300 [ 1124.090637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1124.092432] R13: 00007fffca46adcf R14: 00007fb22d475300 R15: 0000000000022000 15:48:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1327, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2100000000, 0x0, 0x0, 0x0, 0x0) 15:48:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:48:59 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x0, 0x0) 15:49:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) (fail_nth: 28) 15:49:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2713, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1139.099256] EXT4-fs: 16 callbacks suppressed [ 1139.099273] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.102753] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.109993] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.114896] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.118825] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.124492] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.128521] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.130990] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.133036] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.137460] FAULT_INJECTION: forcing a failure. [ 1139.137460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1139.137624] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1139.139922] CPU: 0 PID: 6813 Comm: syz-executor.7 Not tainted 5.10.233 #1 [ 1139.139933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1139.139940] Call Trace: [ 1139.139973] dump_stack+0x107/0x167 [ 1139.146404] should_fail.cold+0x5/0xa [ 1139.147227] _copy_to_user+0x2e/0x180 [ 1139.148051] simple_read_from_buffer+0xcc/0x160 [ 1139.149061] proc_fail_nth_read+0x198/0x230 [ 1139.149985] ? proc_sessionid_read+0x230/0x230 [ 1139.150949] ? security_file_permission+0xb1/0xe0 [ 1139.151990] ? proc_sessionid_read+0x230/0x230 [ 1139.152985] vfs_read+0x228/0x620 [ 1139.153734] ksys_read+0x12d/0x260 [ 1139.154488] ? vfs_write+0xb10/0xb10 [ 1139.155287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1139.156396] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1139.157499] do_syscall_64+0x33/0x40 [ 1139.158299] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1139.159384] RIP: 0033:0x7f2f8855669c [ 1139.160194] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1139.164107] RSP: 002b:00007f2f85b19170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1139.165725] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f2f8855669c [ 1139.167247] RDX: 000000000000000f RSI: 00007f2f85b191e0 RDI: 0000000000000003 [ 1139.168776] RBP: 00007f2f85b191d0 R08: 0000000000000000 R09: 0000000020000300 [ 1139.170288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1139.171794] R13: 00007ffd0cc4f6df R14: 00007f2f85b19300 R15: 0000000000022000 15:49:14 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:14 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2a2a9c7f0000, 0x0, 0x0, 0x0, 0x0) 15:49:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4a2a9c7f0000, 0x0, 0x0, 0x0, 0x0) 15:49:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1152.599528] EXT4-fs: 15 callbacks suppressed [ 1152.599543] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.604159] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.606021] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.608593] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.611512] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.613998] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.617333] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.620950] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.626418] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1152.628955] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60ffffffffff, 0x0, 0x0, 0x0, 0x0) 15:49:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x622c9c7f0000, 0x0, 0x0, 0x0, 0x0) 15:49:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1165.830765] EXT4-fs: 30 callbacks suppressed [ 1165.830776] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7f9c29a7f000, 0x0, 0x0, 0x0, 0x0) 15:49:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1165.836588] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.856925] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1165.868055] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.871729] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.877067] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.881027] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.884281] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.886640] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1165.888933] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7f9c2a2a0000, 0x0, 0x0, 0x0, 0x0) 15:49:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1181.200915] EXT4-fs: 8 callbacks suppressed [ 1181.200931] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.212368] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.215370] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.218067] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7f9c2a4a0000, 0x0, 0x0, 0x0, 0x0) 15:49:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1181.221051] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.224359] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.226153] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.229482] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.232218] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1181.236887] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:49:57 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7f9c2c620000, 0x0, 0x0, 0x0, 0x0) 15:49:57 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:49:57 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1195.547219] EXT4-fs: 20 callbacks suppressed [ 1195.547234] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.550779] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.556714] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.560378] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7ffffffff000, 0x0, 0x0, 0x0, 0x0) [ 1195.571647] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.573636] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.583364] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.585581] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.588548] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1195.590501] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, 0x0) 15:50:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1209.900478] EXT4-fs: 10 callbacks suppressed [ 1209.900487] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.905143] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1209.923713] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1209.935984] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.938881] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.944851] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.952129] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.956192] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.958874] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1209.962270] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:25 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10000000000000, 0x0, 0x0, 0x0, 0x0) 15:50:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:25 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1223.794387] EXT4-fs: 18 callbacks suppressed [ 1223.794397] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.797010] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x20000000000000, 0x0, 0x0, 0x0, 0x0) 15:50:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x131d, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1223.822363] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.825968] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.831147] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1223.835489] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.842212] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.845873] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.848272] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1223.854876] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0a7299c7f0000, 0x0, 0x0, 0x0, 0x0) 15:50:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0) 15:50:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1e6c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1d13, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1237.048562] EXT4-fs: 22 callbacks suppressed [ 1237.048573] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.054153] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.060164] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.062455] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.065505] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.073352] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.074852] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.076195] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.079171] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1237.081543] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:50:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ffffff7f0000, 0x0, 0x0, 0x0, 0x0) 15:50:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0) 15:50:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:50:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1253.355194] EXT4-fs: 22 callbacks suppressed [ 1253.355209] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.358973] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.360907] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.363167] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.365157] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x101000000000000, 0x0, 0x0, 0x0, 0x0) [ 1253.370614] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.375745] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.381103] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.385381] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1253.389987] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x27130000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6c1e, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1269.158963] EXT4-fs: 16 callbacks suppressed [ 1269.158982] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.162140] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.165100] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.167096] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.175340] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.178966] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.181942] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.183904] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.189515] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1269.192590] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x330000000000000, 0x0, 0x0, 0x0, 0x0) [ 1285.198541] EXT4-fs: 4 callbacks suppressed [ 1285.198559] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:40 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1285.213317] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.217152] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.219335] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.221834] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.229474] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.232769] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.235104] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.237456] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1285.241317] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x430000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:41 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1299.422911] EXT4-fs: 28 callbacks suppressed 15:51:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1299.422929] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.427008] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.428959] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.430824] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.434046] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.436336] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.441157] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.446155] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) [ 1299.452509] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1299.457242] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:51:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 15:51:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:51:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1314.076995] EXT4-fs: 18 callbacks suppressed [ 1314.077003] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.084580] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1314.100296] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.103147] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.105315] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.112839] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.114576] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1314.124014] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.128515] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1314.136996] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:09 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:09 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:09 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1334.419264] EXT4-fs: 10 callbacks suppressed [ 1334.419279] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1334.440533] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.445124] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.451450] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.454002] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.460573] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.462477] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.464985] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.468263] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1334.470349] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1201000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1349.388906] EXT4-fs: 28 callbacks suppressed 15:52:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1349.388926] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.414344] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.418293] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.422935] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1349.430276] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.438512] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.442222] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.444934] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.447545] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1349.449580] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2103000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:45 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1363.081905] EXT4-fs: 14 callbacks suppressed [ 1363.081914] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.096933] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2400000000000000, 0x0, 0x0, 0x0, 0x0) 15:52:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3000000000000000, 0x0, 0x0, 0x0, 0x0) [ 1363.117600] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.121176] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1363.128106] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.136179] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.143563] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.150803] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.151915] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1363.155475] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:52:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:52:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x131d0000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1379.711424] EXT4-fs: 10 callbacks suppressed [ 1379.711450] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.717288] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.721089] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.723757] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.728911] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.731794] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.734125] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.736027] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.739798] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1379.742802] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:53:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5505000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1394.752265] EXT4-fs: 28 callbacks suppressed [ 1394.752281] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.757289] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.765124] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.767418] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.772523] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.774836] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.778482] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.781719] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.783894] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1394.786558] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:53:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6400000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x18000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1410.854274] EXT4-fs: 6 callbacks suppressed [ 1410.854299] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.863041] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.865455] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.867804] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.871391] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.874154] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.878229] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.880568] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.882931] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1410.885210] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:53:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7e00000000000000, 0x0, 0x0, 0x0, 0x0) 15:53:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x37000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:53:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6c1e0000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8004000000000000, 0x0, 0x0, 0x0, 0x0) 15:54:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1425.920277] EXT4-fs: 26 callbacks suppressed [ 1425.920287] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.926987] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.935733] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.939545] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.940938] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.949021] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.950270] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.953828] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1425.958702] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8102000000000000, 0x0, 0x0, 0x0, 0x0) [ 1425.964802] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:54:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:14 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:14 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:14 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa1ffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 1439.253149] EXT4-fs: 10 callbacks suppressed [ 1439.253159] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.263103] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.267299] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.270302] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.272586] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.291872] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.293879] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.297462] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.300000] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1439.301345] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe4ffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:54:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf0ffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:54:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1454.336888] EXT4-fs: 26 callbacks suppressed [ 1454.336897] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.344558] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.353098] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.355964] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.358384] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf4ffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 1454.376278] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.379449] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.383837] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.385748] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1454.390489] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 1466.756898] EXT4-fs: 10 callbacks suppressed [ 1466.756908] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.761064] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.764109] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.769131] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.771007] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.777062] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.783064] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1466.785168] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1466.796205] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1466.803078] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:42 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2713000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfbffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:54:42 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1482.850341] EXT4-fs: 22 callbacks suppressed [ 1482.850356] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.868266] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.874909] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.878830] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.880754] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.884747] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:54:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1482.893768] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.895857] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.898831] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1482.900774] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:54:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xff01000000000000, 0x0, 0x0, 0x0, 0x0) 15:54:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) 15:54:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:54:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 15:55:15 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1499.532745] EXT4-fs: 22 callbacks suppressed [ 1499.532757] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.536054] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.537975] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.540086] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.542251] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.543689] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.545357] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.546705] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.549340] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1499.552066] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.818237] EXT4-fs: 4 callbacks suppressed [ 1514.818249] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.826221] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.832555] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.839215] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.842032] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.843986] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.847335] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.852014] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.856337] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1514.863821] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:55:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffffff600000, 0x0, 0x0, 0x0, 0x0) 15:55:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0) 15:55:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) 15:55:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1530.816489] EXT4-fs: 22 callbacks suppressed [ 1530.816500] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.826743] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.832339] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.834005] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.840415] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:55:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) [ 1530.842839] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.845434] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.846777] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.848854] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1530.850274] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:55:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) 15:55:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:55:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 15:55:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) 15:56:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1546.760684] EXT4-fs: 20 callbacks suppressed [ 1546.760694] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.766510] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.772034] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.779925] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.783519] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.786430] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.790980] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.793096] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.795411] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1546.796711] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) 15:56:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, 0x0) [ 1562.653396] EXT4-fs: 20 callbacks suppressed [ 1562.653415] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.658438] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.660335] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.662922] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.666439] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.669050] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.671114] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.673349] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.678939] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1562.682857] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xc, 0x0, 0x0, 0x0) 15:56:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xd, 0x0, 0x0, 0x0) 15:56:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) 15:56:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:30 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1575.222780] EXT4-fs: 18 callbacks suppressed [ 1575.222795] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.229748] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.231859] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.234565] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:30 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1575.242164] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.246007] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.248510] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.251694] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.255056] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1575.259940] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x12, 0x0, 0x0, 0x0) 15:56:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x131d000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x21, 0x0, 0x0, 0x0) 15:56:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1588.392490] EXT4-fs: 18 callbacks suppressed [ 1588.392504] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1588.425173] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.427330] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.429523] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.431482] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.433392] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.435352] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.437380] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.439777] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1588.443269] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x24, 0x0, 0x0, 0x0) 15:56:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x30, 0x0, 0x0, 0x0) 15:56:56 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:56:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1601.091916] EXT4-fs: 18 callbacks suppressed [ 1601.091935] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.095491] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.097627] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.111660] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.112901] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:56 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) [ 1601.117934] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.121311] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.122569] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1601.130376] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:56 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1601.133070] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:56:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1614.825504] EXT4-fs: 8 callbacks suppressed [ 1614.825514] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.828434] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x64, 0x0, 0x0, 0x0) 15:57:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3700000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1614.840598] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.848731] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.851150] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.856029] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.857272] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.859442] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.864017] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1614.865703] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7e, 0x0, 0x0, 0x0) 15:57:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0, 0x0, 0x0, 0x0) 15:57:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x6c1e000000000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1626.805951] EXT4-fs: 24 callbacks suppressed [ 1626.805960] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.822691] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.826574] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.827817] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x112, 0x0, 0x0, 0x0) 15:57:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1626.833623] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.834877] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.836820] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.838451] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.841145] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1626.845736] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x281, 0x0, 0x0, 0x0) 15:57:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) 15:57:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1643.255409] EXT4-fs: 10 callbacks suppressed [ 1643.255428] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1643.268896] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.271670] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.276193] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1643.278782] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.280792] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.282759] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.284661] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.298314] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1643.300201] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x321, 0x0, 0x0, 0x0) 15:57:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x330, 0x0, 0x0, 0x0) 15:57:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1658.194735] EXT4-fs: 18 callbacks suppressed [ 1658.194744] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.202445] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.204314] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.206228] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.208162] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x430, 0x0, 0x0, 0x0) [ 1658.213023] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.217462] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.219470] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.224218] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1658.225878] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:57:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:57:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x480, 0x0, 0x0, 0x0) 15:58:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 15:58:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1672.751089] EXT4-fs: 18 callbacks suppressed [ 1672.751102] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.765405] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.770455] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.783750] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.788357] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.791542] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.797060] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.807804] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.811954] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1672.817687] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:58:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1327, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x555, 0x0, 0x0, 0x0) 15:58:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) 15:58:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) 15:58:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2713, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1688.531275] EXT4-fs: 26 callbacks suppressed [ 1688.531288] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.534116] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.539951] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.543416] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.550281] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.554072] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.557941] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.568162] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.573259] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1688.577297] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:58:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, 0x0) 15:58:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, 0x0) 15:58:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1701.928066] EXT4-fs: 4 callbacks suppressed [ 1701.928084] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.931083] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.934595] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.937114] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.943760] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.945998] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.949466] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.951485] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.955871] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1701.957961] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:58:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, 0x0) 15:58:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1201, 0x0, 0x0, 0x0) 15:58:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) 15:58:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1716.338425] EXT4-fs: 20 callbacks suppressed [ 1716.338439] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.348746] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:58:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1716.358751] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.360903] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.363208] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.365240] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.368929] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.373246] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.375170] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1716.377885] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:58:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2103, 0x0, 0x0, 0x0) 15:58:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2400, 0x0, 0x0, 0x0) 15:58:52 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:58:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3000, 0x0, 0x0, 0x0) 15:59:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1730.415873] EXT4-fs: 22 callbacks suppressed [ 1730.415894] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.420635] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.421966] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.429238] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.431822] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.433833] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.435350] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.437314] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.442462] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1730.445408] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3003, 0x0, 0x0, 0x0) 15:59:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3004, 0x0, 0x0, 0x0) 15:59:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1745.885782] EXT4-fs: 20 callbacks suppressed [ 1745.885799] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.891805] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.895859] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.902989] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.908241] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.911150] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.917961] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.922597] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.925247] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1745.935430] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 15:59:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1759.049938] EXT4-fs: 18 callbacks suppressed [ 1759.049947] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.052639] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.054363] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.062806] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.068062] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.078096] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 15:59:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1759.084026] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.087098] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.091351] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1759.094157] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5505, 0x0, 0x0, 0x0) 15:59:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) 15:59:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x60ff, 0x0, 0x0, 0x0) 15:59:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1772.747140] EXT4-fs: 18 callbacks suppressed [ 1772.747153] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.752318] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.756333] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.760899] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.763888] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.767150] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.768851] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1772.779878] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.781846] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1772.784008] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 15:59:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6400, 0x0, 0x0, 0x0) 15:59:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 15:59:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7e00, 0x0, 0x0, 0x0) 16:00:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x131d, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1788.730187] EXT4-fs: 14 callbacks suppressed [ 1788.730202] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.751256] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.754105] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.760363] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.763202] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.766443] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.772789] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.774734] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.778789] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1788.781315] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:00:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8004, 0x0, 0x0, 0x0) 16:00:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1d13, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8102, 0x0, 0x0, 0x0) 16:00:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1802.777791] EXT4-fs: 26 callbacks suppressed [ 1802.777803] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.780155] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.783266] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.784710] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.788078] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.789943] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.793149] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.795904] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.797400] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1802.800113] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:00:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf000, 0x0, 0x0, 0x0) 16:00:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xff01, 0x0, 0x0, 0x0) 16:00:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1819.042121] EXT4-fs: 4 callbacks suppressed [ 1819.042135] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.049435] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.072063] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.076960] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.086995] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.088956] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.091509] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.093952] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.095809] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1819.098188] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:00:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, 0x0) 16:00:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x100000, 0x0, 0x0, 0x0) 16:00:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x200000, 0x0, 0x0, 0x0) 16:00:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1831.763653] EXT4-fs: 26 callbacks suppressed [ 1831.763668] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.768329] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.781901] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.784144] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.790842] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.792926] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:00:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x27130000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1831.798409] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.800957] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.803791] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1831.813975] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:00:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 16:00:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1e6c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:00:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ffff, 0x0, 0x0, 0x0) 16:01:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1846.429574] EXT4-fs: 14 callbacks suppressed [ 1846.429589] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.433151] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.437128] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.439741] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.442175] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.444821] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.449775] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.452051] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.454493] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1846.456950] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 16:01:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1010000, 0x0, 0x0, 0x0) 16:01:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1861.218978] EXT4-fs: 18 callbacks suppressed [ 1861.218993] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.222221] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.236203] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.238626] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.247044] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.249412] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.251455] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.253733] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.256359] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1861.258733] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 16:01:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6c1e, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 16:01:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1878.288849] EXT4-fs: 30 callbacks suppressed [ 1878.288865] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3300000, 0x0, 0x0, 0x0) 16:01:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1878.304929] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.307329] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.309829] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.311764] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.315100] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.317265] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.320035] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.322770] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1878.326102] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 16:01:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1895.847654] EXT4-fs: 12 callbacks suppressed [ 1895.847669] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4300000, 0x0, 0x0, 0x0) 16:01:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1895.863070] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.868384] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.871896] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.875427] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.877822] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.881649] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.884159] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.886335] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1895.889824] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:01:51 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 16:01:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:01:51 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 16:02:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1909.128709] EXT4-fs: 12 callbacks suppressed 16:02:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1909.128729] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.138009] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.151468] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.155321] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.157303] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.159366] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.161292] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.166388] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.173564] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1909.176759] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 16:02:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) 16:02:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1922.665036] EXT4-fs: 18 callbacks suppressed [ 1922.665047] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.669159] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.676240] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.682000] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.683835] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.688273] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x5000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1922.692078] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.697399] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.704157] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1922.706470] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, 0x0) 16:02:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x131d0000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x7000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) [ 1937.515150] EXT4-fs: 18 callbacks suppressed [ 1937.515182] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.519140] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.529646] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.535231] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.537237] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.538923] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.543017] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.545722] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.547876] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1937.550569] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, 0x0) 16:02:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x12010000, 0x0, 0x0, 0x0) 16:02:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1958.249273] EXT4-fs: 18 callbacks suppressed [ 1958.249281] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x9000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1958.257709] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.263898] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.273360] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.279951] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.282983] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1958.290438] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.292699] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.293851] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1958.295897] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:02:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:02:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 16:02:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 16:03:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1972.584326] EXT4-fs: 18 callbacks suppressed [ 1972.584344] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.588101] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.591438] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.593280] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.595674] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.603211] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.605784] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.613687] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.615719] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1972.618255] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x21000000, 0x0, 0x0, 0x0) 16:03:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x10000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x21030000, 0x0, 0x0, 0x0) 16:03:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x18000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1986.510067] EXT4-fs: 18 callbacks suppressed [ 1986.510076] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.518820] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.520631] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 1986.523493] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.539930] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.544241] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.548432] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.551668] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.553810] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 1986.558137] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x24000000, 0x0, 0x0, 0x0) 16:03:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2001.724366] EXT4-fs: 22 callbacks suppressed [ 2001.724384] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x30000000, 0x0, 0x0, 0x0) 16:03:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x37000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2001.749114] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.752578] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.757177] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.760616] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.781831] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) [ 2001.785546] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.790892] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.792969] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2001.795168] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2017.460267] EXT4-fs: 8 callbacks suppressed [ 2017.460288] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.467836] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.472016] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.474288] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) [ 2017.484945] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.490597] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.491896] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.493170] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.495125] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2017.497689] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:03:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x55050000, 0x0, 0x0, 0x0) 16:03:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6c1e0000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:03:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:05 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 16:04:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:05 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) 16:04:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) 16:04:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2030.213422] EXT4-fs: 18 callbacks suppressed [ 2030.214671] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.217066] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.219079] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2030.230689] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.233404] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.235729] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.237899] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.240248] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value 16:04:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x64000000, 0x0, 0x0, 0x0) [ 2030.247213] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2030.249313] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:04:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:04:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:04:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7e000000, 0x0, 0x0, 0x0) 16:04:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2713000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80040000, 0x0, 0x0, 0x0) 16:04:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) 16:04:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) [ 2046.235564] EXT4-fs: 18 callbacks suppressed [ 2046.235579] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000002,,errors=continue 16:04:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) [ 2046.253363] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2046.262435] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2046.286044] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:04:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x81020000, 0x0, 0x0, 0x0) [ 2046.288274] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2046.290646] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000002,,errors=continue [ 2046.293262] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2046.295369] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2046.297244] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2046.313722] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000002,,errors=continue 16:04:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) 16:04:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) 16:04:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:04:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 16:04:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:04:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xa1ffffff, 0x0, 0x0, 0x0) 16:04:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) 16:04:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) [ 2059.563964] EXT4-fs: 20 callbacks suppressed [ 2059.563976] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000002,,errors=continue [ 2059.573227] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000002,,errors=continue [ 2059.576687] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.578954] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.581161] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.583132] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.588079] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.589409] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.594301] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2059.597457] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:04:35 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xe4ffffff, 0x0, 0x0, 0x0) 16:04:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) 16:04:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:04:35 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:04:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:04:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2073.063008] EXT4-fs: 22 callbacks suppressed [ 2073.063023] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2073.066011] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2073.069224] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2073.082160] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000007,,errors=continue [ 2073.087322] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:04:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:04:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:04:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ffffff, 0x0, 0x0, 0x0) 16:04:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) [ 2073.101336] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue [ 2073.104117] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000007,,errors=continue [ 2073.109876] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue [ 2073.116140] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue [ 2073.118070] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:04:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf4ffffff, 0x0, 0x0, 0x0) 16:04:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:04:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:04:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) 16:05:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 16:05:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) [ 2088.898529] EXT4-fs: 14 callbacks suppressed [ 2088.898539] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2088.903087] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000009,,errors=continue [ 2088.911216] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2088.914003] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2088.920056] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2088.921766] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2088.923433] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000009,,errors=continue [ 2088.925935] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:05:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) 16:05:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) [ 2088.933987] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000a,,errors=continue [ 2088.938151] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:05:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0xa}}]}) 16:05:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0xa}}]}) 16:05:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 16:05:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) 16:05:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) 16:05:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:05:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 16:05:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:05:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) [ 2106.019019] EXT4-fs: 22 callbacks suppressed [ 2106.019034] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:05:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:05:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:05:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xff010000, 0x0, 0x0, 0x0) 16:05:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:05:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) [ 2106.036029] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2106.041211] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue [ 2106.043144] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2106.066960] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2106.069042] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2106.077553] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2106.088607] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue [ 2106.092598] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2106.095169] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue 16:05:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:05:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) 16:05:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:05:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:05:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) [ 2120.921495] EXT4-fs: 4 callbacks suppressed [ 2120.921512] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue 16:05:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xff600000, 0x0, 0x0, 0x0) [ 2120.944359] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2120.948160] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2120.950191] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2120.955370] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2120.958141] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2120.967777] EXT4-fs (sda): Unrecognized mount option "stripe" or missing value [ 2120.978909] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue [ 2120.981368] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2120.984283] EXT4-fs (sda): Unrecognized mount option "stripe" or missing value 16:05:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffff000, 0x0, 0x0, 0x0) 16:05:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:05:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x5b}}]}) 16:05:36 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:05:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) 16:05:36 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x5b}}]}) 16:05:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:36 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 16:05:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) 16:05:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) 16:05:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) 16:05:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) [ 2135.050327] EXT4-fs: 30 callbacks suppressed [ 2135.050344] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2135.056366] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000003,,errors=continue 16:05:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:05:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:05:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:05:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x131d000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 16:05:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:05:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) 16:05:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) [ 2135.070945] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2135.074653] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000003,,errors=continue [ 2135.081047] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue [ 2135.086255] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2135.090352] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2135.093883] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2135.096566] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2135.099497] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue 16:05:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffa1, 0x0, 0x0, 0x0) 16:06:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffe4, 0x0, 0x0, 0x0) 16:06:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:06:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:06:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:06:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:06:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) [ 2151.057525] EXT4-fs: 4 callbacks suppressed [ 2151.057539] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2151.065052] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2151.067134] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2151.069282] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2151.075103] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000037,,errors=continue [ 2151.077863] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2151.080742] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2151.083786] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2151.086342] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2151.092498] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000037,,errors=continue 16:06:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffff0, 0x0, 0x0, 0x0) 16:06:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:06:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:06:06 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5}}]}) 16:06:06 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5}}]}) 16:06:06 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:06:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffff4, 0x0, 0x0, 0x0) 16:06:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6}}]}) 16:06:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 16:06:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:06:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) [ 2166.855448] EXT4-fs: 20 callbacks suppressed [ 2166.855460] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2166.859332] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2166.864557] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue 16:06:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:06:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6}}]}) [ 2166.868122] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2166.872986] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2166.885917] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000006,,errors=continue [ 2166.887677] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2166.892187] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2166.894224] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000006,,errors=continue [ 2166.901355] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000006,,errors=continue 16:06:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:06:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:06:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:06:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 16:06:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:06:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:06:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:06:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:06:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0) 16:06:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) 16:06:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3700000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000000000, 0x0, 0x0, 0x0) 16:06:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:06:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:06:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:06:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) [ 2182.181935] EXT4-fs: 22 callbacks suppressed [ 2182.181951] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002e00,,errors=continue [ 2182.185494] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2182.188396] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2182.191454] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2182.193491] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000009,,errors=continue [ 2182.195653] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001800,,errors=continue [ 2182.197721] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue [ 2182.199797] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002e00,,errors=continue [ 2182.203646] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2182.205713] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue 16:06:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2100000000, 0x0, 0x0, 0x0) 16:06:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) 16:06:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) 16:06:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:06:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) 16:06:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:06:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, 0x0) 16:06:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x6c1e000000000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:06:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:06:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:06:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:06:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) [ 2197.694934] EXT4-fs: 18 callbacks suppressed [ 2197.694947] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000a,,errors=continue [ 2197.697349] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001800,,errors=continue [ 2197.699940] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2197.701398] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000b,,errors=continue [ 2197.703642] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2197.705142] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001800,,errors=continue [ 2197.707330] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2197.709247] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000004000,,errors=continue [ 2197.713355] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000a,,errors=continue [ 2197.715736] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:06:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2a2a9c7f0000, 0x0, 0x0, 0x0) 16:06:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:06:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:06:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) 16:06:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:06:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0xa}}]}) 16:06:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:06:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:06:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:07:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:07:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4a2a9c7f0000, 0x0, 0x0, 0x0) 16:07:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) [ 2211.686918] EXT4-fs: 22 callbacks suppressed [ 2211.686936] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2211.691703] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2211.702618] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2211.707027] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:07:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:07:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) 16:07:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:07:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:07:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) [ 2211.712228] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2211.727066] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2211.730250] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2211.749720] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2211.752244] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2211.756589] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value 16:07:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) 16:07:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0xa}}]}) 16:07:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:07:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x60ffffffffff, 0x0, 0x0, 0x0) [ 2227.372075] EXT4-fs: 10 callbacks suppressed [ 2227.372090] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000037,,errors=continue [ 2227.378219] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue 16:07:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) 16:07:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x22}}]}) 16:07:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:07:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:07:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:07:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:07:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:07:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x622c9c7f0000, 0x0, 0x0, 0x0) [ 2227.394654] EXT4-fs (sda): Unrecognized mount option "stripe" or missing value [ 2227.407675] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000037,,errors=continue [ 2227.411390] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2227.415118] EXT4-fs (sda): Unrecognized mount option "stripe" or missing value 16:07:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7f9c29a7f000, 0x0, 0x0, 0x0) [ 2227.431598] EXT4-fs (sda): Unrecognized mount option "stripe"0x0000000000000000" or missing value [ 2227.436762] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue [ 2227.438775] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2227.441738] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000004000,,errors=continue 16:07:23 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:07:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:07:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) 16:07:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:07:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x5b}}]}) 16:07:23 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x2c}}]}) 16:07:23 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) 16:07:23 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7f9c2a2a0000, 0x0, 0x0, 0x0) 16:07:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7f9c2a4a0000, 0x0, 0x0, 0x0) 16:07:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x5b}}]}) 16:07:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:07:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500}}]}) 16:07:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:07:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:07:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) 16:07:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) [ 2242.590325] EXT4-fs: 18 callbacks suppressed [ 2242.590333] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2242.593791] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue 16:07:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7f9c2c620000, 0x0, 0x0, 0x0) [ 2242.597065] EXT4-fs (sda): Unrecognized mount option "stripe[0x0000000000000000" or missing value [ 2242.611647] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2242.612752] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000500,,errors=continue [ 2242.614643] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2242.616050] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000500,,errors=continue [ 2242.618229] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2242.620139] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2242.623577] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue 16:07:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:07:38 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7ffffffff000, 0x0, 0x0, 0x0) 16:07:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2}}]}) 16:07:38 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) 16:07:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:07:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600}}]}) 16:07:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500}}]}) 16:07:38 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) [ 2259.149201] EXT4-fs: 18 callbacks suppressed [ 2259.149211] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2259.157203] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue 16:07:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) 16:07:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:07:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:07:54 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600}}]}) 16:07:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 16:07:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:07:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:07:54 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) [ 2259.159526] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2259.161884] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2259.164475] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue [ 2259.166337] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue [ 2259.168198] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue [ 2259.170905] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000003,,errors=continue [ 2259.172913] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2259.176037] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000600,,errors=continue 16:07:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:07:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:07:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:07:54 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 16:07:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:07:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5}}]}) 16:07:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:07:55 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:08:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6}}]}) 16:08:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5}}]}) 16:08:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:08:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) [ 2275.397282] EXT4-fs: 18 callbacks suppressed [ 2275.397299] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000900,,errors=continue [ 2275.400943] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000005,,errors=continue [ 2275.404676] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue 16:08:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:08:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) 16:08:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000000000000, 0x0, 0x0, 0x0) [ 2275.412001] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000005,,errors=continue [ 2275.415982] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue 16:08:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) [ 2275.421065] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2275.426468] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue [ 2275.430365] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue [ 2275.431848] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2275.435076] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue 16:08:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6}}]}) 16:08:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:08:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:08:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:08:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0a7299c7f0000, 0x0, 0x0, 0x0) 16:08:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:08:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:08:11 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) [ 2287.079190] EXT4-fs: 18 callbacks suppressed [ 2287.079200] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue [ 2287.088190] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000008,,errors=continue 16:08:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:08:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7}}]}) 16:08:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:08:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:08:22 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:08:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) 16:08:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 16:08:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) [ 2287.094116] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2287.096469] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000b00,,errors=continue [ 2287.103472] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000007,,errors=continue [ 2287.106131] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000007,,errors=continue 16:08:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) [ 2287.121745] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2287.125965] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000b00,,errors=continue [ 2287.131873] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue [ 2287.135182] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue 16:08:22 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ffffff7f0000, 0x0, 0x0, 0x0) 16:08:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 16:08:22 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:08:22 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:08:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) 16:08:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) [ 2298.414497] EXT4-fs: 12 callbacks suppressed [ 2298.414506] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000a,,errors=continue [ 2298.439131] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001327,,errors=continue 16:08:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ffffffffffff, 0x0, 0x0, 0x0) 16:08:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1327}}]}) 16:08:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:08:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) 16:08:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9}}]}) 16:08:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) [ 2298.444609] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2298.447755] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2298.449671] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000a,,errors=continue [ 2298.451476] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2298.453551] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000009,,errors=continue [ 2298.458175] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2298.462007] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001327,,errors=continue [ 2298.463648] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000009,,errors=continue 16:08:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:08:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:08:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa}}]}) 16:08:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 16:08:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:08:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:08:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:08:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:08:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:08:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:08:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) 16:08:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:08:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x101000000000000, 0x0, 0x0, 0x0) 16:08:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:08:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) 16:08:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb}}]}) 16:08:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2713}}]}) 16:08:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:08:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:08:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) [ 2314.836790] EXT4-fs: 26 callbacks suppressed [ 2314.836805] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000080000,,errors=continue [ 2314.840921] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue [ 2314.843188] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002713,,errors=continue [ 2314.848845] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002713,,errors=continue [ 2314.851247] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000080000,,errors=continue [ 2314.853796] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2314.856554] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2314.859093] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue 16:08:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) [ 2314.861772] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000000b,,errors=continue [ 2314.865117] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000018,,errors=continue 16:08:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) 16:09:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:09:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:09:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:09:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10}}]}) 16:09:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 16:09:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:09:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:09:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) [ 2331.924550] EXT4-fs: 6 callbacks suppressed [ 2331.924566] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2331.938012] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2331.952962] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2331.963670] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2331.971248] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue [ 2331.973329] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue [ 2331.975438] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue [ 2331.979135] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue [ 2331.983632] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000010,,errors=continue [ 2331.986699] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue 16:09:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x330000000000000, 0x0, 0x0, 0x0) 16:09:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:09:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:09:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) 16:09:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:09:07 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18}}]}) 16:09:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:09:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) 16:09:07 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 16:09:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) 16:09:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:09:07 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:09:07 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:09:21 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff}}]}) 16:09:21 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e}}]}) 16:09:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:09:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:09:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) 16:09:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x430000000000000, 0x0, 0x0, 0x0) 16:09:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:09:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) [ 2346.110457] EXT4-fs: 14 callbacks suppressed [ 2346.110472] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2346.138673] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue [ 2346.140661] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2346.143631] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue [ 2346.147486] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2346.156101] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2346.159404] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000002e,,errors=continue [ 2346.162125] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue 16:09:21 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 16:09:21 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:09:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500}}]}) 16:09:21 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) 16:09:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5000000}}]}) 16:09:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000000000}}]}) 16:09:22 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:09:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37}}]}) [ 2346.332953] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000500,,errors=continue [ 2346.353802] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000500,,errors=continue [ 2361.979209] EXT4-fs: 6 callbacks suppressed [ 2361.979223] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue 16:09:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 16:09:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300}}]}) 16:09:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600}}]}) 16:09:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) 16:09:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6000000}}]}) 16:09:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:09:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:09:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000000000}}]}) [ 2362.003033] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue [ 2362.005154] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue [ 2362.020167] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000600,,errors=continue [ 2362.023783] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000300,,errors=continue 16:09:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:09:37 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) [ 2362.057574] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000002000000,,errors=continue [ 2362.066038] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000600,,errors=continue [ 2362.071058] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000002000000,,errors=continue 16:09:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500}}]}) 16:09:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 16:09:37 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:09:37 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:09:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) [ 2362.184914] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue [ 2362.188553] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000007000000,,errors=continue 16:09:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:09:38 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:09:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:09:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) 16:09:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:09:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:09:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600}}]}) 16:09:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 16:09:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) 16:09:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) [ 2374.727875] EXT4-fs: 8 callbacks suppressed [ 2374.727888] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue [ 2374.729826] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2374.736480] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2374.739750] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000009000000,,errors=continue 16:09:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) [ 2374.754935] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000900,,errors=continue [ 2374.759890] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000600,,errors=continue [ 2374.766527] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000900,,errors=continue [ 2374.770817] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000600,,errors=continue 16:09:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5000000}}]}) 16:09:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) [ 2374.868169] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue [ 2374.874247] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue 16:10:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6000000}}]}) 16:10:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:10:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) 16:10:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:10:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) 16:10:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 16:10:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:10:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700}}]}) 16:10:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, 0x0) [ 2386.240300] EXT4-fs: 2 callbacks suppressed [ 2386.240309] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue [ 2386.245542] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2386.248153] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2386.252996] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2386.255189] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000700,,errors=continue [ 2386.261765] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000a00,,errors=continue 16:10:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) [ 2386.272575] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue 16:10:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900}}]}) [ 2386.282151] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue 16:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:10:02 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1201000000000000, 0x0, 0x0, 0x0) 16:10:02 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) [ 2386.337937] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000900,,errors=continue [ 2386.339115] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000010000000,,errors=continue 16:10:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:10:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) 16:10:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) 16:10:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:10:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00}}]}) 16:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) 16:10:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) 16:10:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:10:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:10:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:10:16 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00}}]}) 16:10:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x131d}}]}) 16:10:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:10:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) [ 2401.101635] EXT4-fs: 10 callbacks suppressed [ 2401.101649] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2401.116626] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000131d,,errors=continue [ 2401.131653] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2401.137641] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2401.139555] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000000131d,,errors=continue [ 2401.142003] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2401.154730] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000b00,,errors=continue [ 2401.164543] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000b00,,errors=continue 16:10:16 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:10:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:10:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2103000000000000, 0x0, 0x0, 0x0) 16:10:16 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:10:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) 16:10:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:10:17 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:10:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800}}]}) [ 2401.291520] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue [ 2401.294922] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue 16:10:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) [ 2417.690896] EXT4-fs: 6 callbacks suppressed [ 2417.690905] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001e6c,,errors=continue 16:10:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1e6c}}]}) 16:10:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:10:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1d13}}]}) 16:10:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) 16:10:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) 16:10:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2400000000000000, 0x0, 0x0, 0x0) 16:10:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) [ 2417.704544] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001e6c,,errors=continue [ 2417.705946] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001d13,,errors=continue [ 2417.712562] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000001d13,,errors=continue [ 2417.713778] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue [ 2417.727075] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue 16:10:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3000000000000000, 0x0, 0x0, 0x0) [ 2417.736072] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue 16:10:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) 16:10:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00}}]}) [ 2417.754958] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue 16:10:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:10:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:10:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) 16:10:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:10:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) [ 2417.835901] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002e00,,errors=continue [ 2417.844813] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000002e00,,errors=continue 16:10:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) 16:10:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:10:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 16:10:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:10:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:10:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700}}]}) 16:10:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:10:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) [ 2432.679064] EXT4-fs: 4 callbacks suppressed [ 2432.679086] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2432.682765] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000010000000,,errors=continue [ 2432.685131] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2432.698979] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000010000000,,errors=continue 16:10:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) [ 2432.708493] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue [ 2432.728773] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000003700,,errors=continue 16:10:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) 16:10:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:10:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:10:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) 16:10:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000}}]}) 16:10:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:10:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) [ 2432.845606] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2432.858588] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2432.883873] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000004000,,errors=continue [ 2432.890682] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000004000,,errors=continue 16:11:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:11:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5505000000000000, 0x0, 0x0, 0x0) 16:11:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:11:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:11:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:11:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6c1e}}]}) 16:11:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x27130000}}]}) [ 2449.133105] EXT4-fs: 2 callbacks suppressed [ 2449.133120] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000006c1e,,errors=continue [ 2449.145887] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000027130000,,errors=continue [ 2449.148534] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000080000,,errors=continue 16:11:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) [ 2449.167135] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000006c1e,,errors=continue [ 2449.176668] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000027130000,,errors=continue [ 2449.178875] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000080000,,errors=continue 16:11:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:11:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000}}]}) 16:11:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) 16:11:05 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:11:05 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:11:05 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:11:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff}}]}) [ 2449.342831] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue [ 2449.352441] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2449.354550] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000080000,,errors=continue [ 2449.360944] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue 16:11:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x6400000000000000, 0x0, 0x0, 0x0) 16:11:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:11:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:11:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) 16:11:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:11:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:11:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:11:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff}}]}) 16:11:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) [ 2463.640808] EXT4-fs: 2 callbacks suppressed [ 2463.640820] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue 16:11:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) [ 2463.650648] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue [ 2463.654142] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000e0ffff,,errors=continue [ 2463.661548] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000037000000,,errors=continue [ 2463.663587] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2463.676094] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue 16:11:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:11:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x7e00000000000000, 0x0, 0x0, 0x0) 16:11:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) 16:11:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000}}]}) 16:11:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:11:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:11:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) [ 2463.827238] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2463.849676] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000001000000,,errors=continue [ 2463.902079] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2463.906030] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000002000000,,errors=continue 16:11:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:11:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:11:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) 16:11:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8004000000000000, 0x0, 0x0, 0x0) 16:11:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2000000}}]}) 16:11:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:11:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:11:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) [ 2477.540174] EXT4-fs: 2 callbacks suppressed [ 2477.540189] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2477.549507] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000002000000,,errors=continue [ 2477.555764] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000002000000,,errors=continue [ 2477.561883] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue 16:11:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:11:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8102000000000000, 0x0, 0x0, 0x0) 16:11:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffe000}}]}) 16:11:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:11:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 16:11:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) 16:11:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) 16:11:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3000000}}]}) 16:11:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:11:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) [ 2492.986103] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2492.987881] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue 16:11:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) [ 2493.011823] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000003000000,,errors=continue [ 2493.013519] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue 16:11:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xa1ffffff00000000, 0x0, 0x0, 0x0) 16:11:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:11:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:11:48 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) 16:11:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:11:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000}}]}) 16:11:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5000000}}]}) 16:11:48 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:11:48 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xe4ffffff00000000, 0x0, 0x0, 0x0) [ 2493.160773] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2493.175227] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value 16:11:48 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) [ 2493.210829] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2493.214137] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000004000000,,errors=continue [ 2493.221858] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000005000000,,errors=continue [ 2493.227570] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000005000000,,errors=continue 16:12:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffffff00000000}}]}) 16:12:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) 16:12:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6000000}}]}) 16:12:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:12:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf0ffffff00000000, 0x0, 0x0, 0x0) 16:12:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500000000000000}}]}) [ 2508.639045] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000." or missing value 16:12:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x5000000}}]}) 16:12:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000000000}}]}) [ 2508.659942] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue 16:12:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0) [ 2508.672749] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000005000000,,errors=continue [ 2508.674873] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2508.683493] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2508.694642] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000." or missing value 16:12:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600000000000000}}]}) [ 2508.706699] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue [ 2508.708671] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000005000000,,errors=continue 16:12:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) 16:12:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:12:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:12:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6000000}}]}) 16:12:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) 16:12:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:12:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) [ 2508.846918] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2508.850120] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000006000000,,errors=continue 16:12:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) 16:12:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:12:04 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) 16:12:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x7000000}}]}) 16:12:04 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 16:12:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 16:12:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) 16:12:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) 16:12:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) 16:12:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:12:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:12:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:12:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000}}]}) [ 2523.681782] EXT4-fs: 14 callbacks suppressed [ 2523.681798] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:12:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xff01000000000000, 0x0, 0x0, 0x0) [ 2523.699748] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2523.704801] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2523.724621] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2523.728517] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2523.733068] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:12:19 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) [ 2523.741225] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2523.743097] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000008000000,,errors=continue [ 2523.744979] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2523.751661] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue 16:12:19 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff00000000}}]}) 16:12:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) 16:12:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:12:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x9000000}}]}) 16:12:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:12:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:12:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:12:33 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:12:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:12:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa000000}}]}) 16:12:33 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 16:12:33 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:12:33 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) 16:12:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) [ 2538.153488] EXT4-fs: 8 callbacks suppressed [ 2538.153498] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2538.159104] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2538.181000] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2538.190465] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2538.192217] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue [ 2538.193736] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2538.210242] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2538.221639] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue [ 2538.222820] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue [ 2538.233948] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000a000000,,errors=continue 16:12:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffff600000, 0x0, 0x0, 0x0) 16:12:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) 16:12:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:12:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) 16:12:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb000000}}]}) 16:12:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:12:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:12:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) [ 2553.858506] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2553.860789] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2553.867740] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2553.870025] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:12:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0) [ 2553.875564] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2553.885172] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:12:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) [ 2553.898858] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2553.901094] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000b000000,,errors=continue [ 2553.903572] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2553.909523] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:12:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:12:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) 16:12:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:12:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x10000000}}]}) 16:12:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:12:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:12:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 16:12:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:12:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:12:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x131d0000}}]}) 16:12:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) 16:12:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:13:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x18000000}}]}) 16:13:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) 16:13:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:13:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 2574.940196] EXT4-fs: 18 callbacks suppressed [ 2574.940211] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue 16:13:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:13:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) 16:13:10 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500000000000000}}]}) 16:13:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xa}) [ 2574.952105] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2574.962829] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2574.969664] EXT4-fs (sda): Unrecognized mount option " [ 2574.969664] " or missing value [ 2574.979405] EXT4-fs (sda): Unrecognized mount option " [ 2574.979405] " or missing value 16:13:10 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) [ 2574.998117] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue [ 2575.002254] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2575.004347] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:13:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xb}) [ 2575.019607] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2575.028677] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000018000000,,errors=continue 16:13:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:13:10 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:13:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xa}) 16:13:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600000000000000}}]}) 16:13:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:13:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 16:13:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e000000}}]}) 16:13:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) 16:13:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:13:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x10}) [ 2589.063141] EXT4-fs: 6 callbacks suppressed [ 2589.063156] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2589.069907] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2589.088763] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2589.103506] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2589.114462] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2589.119722] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue 16:13:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) [ 2589.121711] EXT4-fs (sda): Unrecognized mount option " [ 2589.121711] " or missing value 16:13:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) [ 2589.132108] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:13:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6c1e0000}}]}) [ 2589.142548] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000002e000000,,errors=continue [ 2589.144545] EXT4-fs (sda): Unrecognized mount option " [ 2589.144545] " or missing value 16:13:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) 16:13:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:13:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x37000000}}]}) 16:13:25 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x18}) 16:13:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xb}) 16:13:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x10}) 16:13:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x40000000}}]}) 16:13:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:13:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:13:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 16:13:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:13:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) 16:13:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2e}) [ 2603.426751] EXT4-fs: 10 callbacks suppressed [ 2603.426766] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2603.439665] EXT4-fs (sda): Unrecognized mount option "." or missing value [ 2603.450647] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000040000000,,errors=continue [ 2603.454072] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:13:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) [ 2603.465745] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:13:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) [ 2603.483694] EXT4-fs (sda): Unrecognized mount option " " or missing value [ 2603.487794] EXT4-fs (sda): Unrecognized mount option "." or missing value 16:13:39 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) [ 2603.495410] EXT4-fs (sda): Unrecognized mount option " " or missing value 16:13:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff}}]}) 16:13:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x37}) 16:13:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:13:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x18}) 16:13:39 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xa}) 16:13:39 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc, 0x0) [ 2603.652192] EXT4-fs (sda): Unrecognized mount option "7" or missing value [ 2603.669537] EXT4-fs (sda): Unrecognized mount option "7" or missing value 16:13:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xb}) 16:13:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:13:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2e}) 16:13:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffe000}}]}) 16:13:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff}}]}) 16:13:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) 16:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd, 0x0) 16:13:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2617.385018] EXT4-fs: 4 callbacks suppressed [ 2617.385034] EXT4-fs (sda): Unrecognized mount option " " or missing value 16:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) [ 2617.419727] EXT4-fs (sda): Unrecognized mount option "." or missing value [ 2617.427939] EXT4-fs (sda): Unrecognized mount option "." or missing value 16:13:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x50020, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) open(&(0x7f0000000080)='./file0\x00', 0x14081, 0x46) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000180)='./mnt\x00', 0x51, 0x4, &(0x7f0000000280)=[{&(0x7f00000001c0)="f29e02ffe5046847e6c0de18ccf7ec065d4ecbb9e9465f8a496593b6327693b6d9477c", 0x23, 0x8}, {&(0x7f0000000240)="94acec7ded8f0d0f9d836013a2a41d18781d05cd775f", 0x16, 0x1000}, {&(0x7f00000003c0)="4decd55b65adcd41e4fb6861cceb18619fe411f89667c0bcf806bd08da8ab2fc300754e9db09560391cfde9c7c4fe4b4a4f5016580937bc3340c455149e8dab12cbcb765e28f481d26268db4c894b770f452aee2ce29e21e7c47c844255147ffc8ff77b60bd258b108ace58825b4de5834fa2c19bab0df7a30983ab99d6d97f1773c745f29cc400465d3e4b7d51b34e15350044a", 0x94, 0xa5}, {&(0x7f0000000580)="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", 0x1000, 0x5f26}], 0x1800, &(0x7f0000000480)={[{@uid={'uid', 0x3d, r1}}, {@huge_advise}, {@nr_inodes={'nr_inodes', 0x3d, [0x25]}}], [{@seclabel}, {@context={'context', 0x3d, 'root'}}, {@dont_appraise}]}) openat(r0, &(0x7f0000000040)='./file0/../file0\x00', 0x103000, 0x1) mkdir(&(0x7f0000000000)='./file0/../file0\x00', 0x102) [ 2617.442706] EXT4-fs (sda): Unrecognized mount option " " or missing value 16:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12, 0x0) 16:13:53 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffe000}}]}) 16:13:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x10}) 16:13:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x37}) 16:13:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:13:53 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0xa}]}) 16:13:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) [ 2617.587759] EXT4-fs (sda): Unrecognized mount option "7" or missing value [ 2617.613150] EXT4-fs (sda): Unrecognized mount option "7" or missing value 16:13:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x21, 0x0) [ 2617.630576] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2617.630576] " or missing value [ 2617.639101] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2617.644777] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2617.672806] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2617.672806] " or missing value 16:13:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x2050004, 0x0) 16:14:08 executing program 7: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x40880, 0x96, 0x2}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:08 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:14:08 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x8010, r1, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r2 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file1\x00', 0x967, 0x4, &(0x7f0000000180)=[{&(0x7f00000003c0)="c20b7fee50cbf05e6a2239c7cb7df0b30271288ecd007621f9a2332eac8a68d075ea31deb1aeea46813bfa8d7cd4b3ca015eee271a5179f5e282d018870dbca71c8b087e9f04c18c97f9e4877f8611d6e64265084ee3546473cf864634bb9755fa00f1e3ef1d5cbe4229d44ef37b52683f10de838c474f9b9b3393c71f6b7b30fe11a22d141dbfb2e9099ec69bbf737c606ee9ebb4fbe69b7dd355b07ae5ae281e4ed11fdf4231287c96f7d299ed0b570fc274c8628cfc7536d8db0d532917147b4eb4a765429e3fbf6027efee88e45d4081290e352ef45a2a308b47c2143bbcc87ce8ee93cb23e2", 0xe8, 0x3}, {&(0x7f0000000240)="bc4b527b8ef2d6a0694ebf03a7610e5b894e34744726372237afa9350c8a09eba983b44c9199d05f2835a1d97343d1f422dcba494f59421a7751e5687973c996150d1b5168f088c27230fde64566b519563b85624aa9f344f7ccdd45b49489f51cbb6764ccd8839cca5b0af25f678789443b979224be72d77ee481efa763cd254b4e3545b1be3c27ae5b75ae7b127c44968281f798d0f2893769d193486a2b26bf2bedba21", 0xa5, 0xf785}, {&(0x7f0000000080)="d0931183b48e02fb846250fc3ad855f2bcbfd76e1fe3f71f3da845474ebc60c07551c1d964dcef8e1131da6570a7cd66b6d007ad74249267bef2a831cfe654af", 0x40, 0x5}, {&(0x7f00000000c0)="80b8c64c026b031656bf7335fa280c71", 0x10, 0x6}], 0x200001, &(0x7f00000004c0)={[{@huge_advise}, {@huge_never}, {@mode={'mode', 0x3d, 0xb5}}, {@huge_advise}], [{@fsname={'fsname', 0x3d, '\\^-'}}, {@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) fcntl$setown(r2, 0x8, r3) 16:14:08 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:14:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:14:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffff8c}}]}) 16:14:08 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x24, 0x0) 16:14:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x18}) [ 2632.857650] EXT4-fs: 2 callbacks suppressed [ 2632.857667] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2632.868841] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2632.872753] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2632.879538] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2632.889543] SELinux: duplicate or incompatible mount options [ 2632.894690] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2632.926913] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2637.408454] Bluetooth: hci7: command 0x0409 tx timeout [ 2639.457658] Bluetooth: hci7: command 0x041b tx timeout [ 2641.504625] Bluetooth: hci7: command 0x040f tx timeout [ 2642.381045] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2642.383301] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2642.387218] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2642.445022] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2642.446918] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2642.449645] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2642.588028] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2643.554467] Bluetooth: hci7: command 0x0419 tx timeout 16:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffff6}}]}) 16:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x30, 0x0) 16:14:34 executing program 7: r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) ioctl$TIOCNXCL(r0, 0x540d) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x5, 0xcd}) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) pread64(r2, &(0x7f0000000000)=""/92, 0x5c, 0xb8) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374726970653d30783030303030303030060030300323303000"]) 16:14:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x7, &(0x7f0000000640)=[{&(0x7f0000000240)="b12fec4869a556ed80795c83e924274e4c943df077e88602c929206181be31ff9c49bf3ad1e1cc85f02aa831b1f6cc0eccd028753ea6531ec6eb5dc8a118f86b0a1a8fb96158539b2e62db96d2861c01710d5dd58469a9bcb8cd4ab50a6e6a66a2d6ef197f7378bb62a6d77bf0760a0fb188130d094f1f2773e288b89a25d4cef33ecb3e1b334b21b913ff7d7f033623d43344f8", 0x94, 0x4}, {&(0x7f0000000080)="7837677ee48302ea848597786e71476a7e56808f0d53b75af724dd89e252b0ba16ea7839966270933071e56cec51281a925971a1b75a9055b4caab1d9b83841512ac87184eb3b5ac40e9c73e19cee37705805e29c14d428131577df7d06f7be14e1d9256925f10bb8e181bfe786cafbbfc0848c448d01642c0ba9d0c49d9d85a", 0x80, 0x4}, {&(0x7f0000000180)="e1617499b5048a09854b06741a98e16068159142cb74d912f5cb56845a3f53009d285d7e5b6aa50d4c484acba587856d05857ca9efc92a7d092727569499846c021be1001b7f4eb37bd3db31240ef2b2dfdec51420c0b2611a0e", 0x5a, 0x4e2}, {&(0x7f00000003c0)="ef660bdbfade70b9a3f36b8e1fd01eeda4cdb33cefd4f87cdda144bbdbef877c482c4959e1f2bf683d87bc0d2257b9c86481c5fdac5b8e849c9207234dd4dfd9e69640558042f63517aca02c878e821454e1f874aa3a3bec3cf124a9426aad54606d5e2c97d412f9d1d37f1092166f2b13f35d8ebd4ecba7e63875f8a0d83e102ec492ffc060484d59c7acbad0a30aa33800a7cdd407cdbabd1b0c", 0x9b, 0x8}, {&(0x7f0000000480)="3c986849a14d5d3da7ccdc92449d0facade260a7202076518a0768cac84dc441548e1ced8316f231c440b80127716e90916084de48f65f56b671b56f2ad3976f428600f24c4ea5e02ec25d79046702e4a86e15fc920d31c157b2ecb1bf919911eb5a92cc056529b4ed7d0e581002bab65269a49bf76825ae0efa4781297289d32f8fd3c25a147e4fafa2915f58303801f9940feb6129cee05eac26a2cb3284c7289c799cd199934e1a1a315623ff005979c90d1b68cb040beb6c6ba2c1cd350df4f8f1293d710f112469a133f07f69cf55dea5ce3c91dd54d56a9517ade79a853bc80c14cf5ab539efcfefc4b6c7f280744c16aa", 0xf4, 0x8001}, {&(0x7f0000000580)="76908929c1602d786e7118ab62c963bc0a94c97951ab14d1b99c11f2530cc55a83b7de8f25e8e0064ae1c3940c38bf48c01d33bd36dc3980d9a8514280ced11d26eadb404d5c8c260c3e306cf932700d371c71489d56724581f56d3a1023d113b96c8ded2eb91b71aca61321c0c77ef38a067323e025e85060a47db48ba56cd66b6c60c39eb1ee679c", 0x89, 0x80000000}, {&(0x7f0000000340)="b35038b7fb19eeae03bcb2be726074af87b57567eb1c8637c1923d8aebb7ecf3362842ab11b7b9b7e8e83484e0f213650c3573a87ed40cbe70990a", 0x3b, 0x6}], 0xb2004, &(0x7f0000000700)={[{'+#!i:'}, {'ext2\x00'}, {'.,+}!['}], [{@smackfsfloor={'smackfsfloor', 0x3d, '('}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffff}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2e}) 16:14:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:14:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) 16:14:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000000000}}]}) [ 2658.571621] EXT4-fs (sda): Unrecognized mount option "." or missing value [ 2658.578644] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000." or missing value [ 2658.586657] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000." or missing value [ 2658.604745] EXT4-fs (sda): Unrecognized mount option "stripe=0x00000000" or missing value 16:14:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x60, 0x0) [ 2658.613780] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2658.616388] EXT4-fs (sda): Unrecognized mount option "." or missing value 16:14:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:14:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='sdripe=0x0000000000000000,\x00']) 16:14:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x37}) 16:14:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2713000000000000}}]}) 16:14:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0/../file0\x00', 0x400001, 0x0, 0x0, 0x1000, 0x0) chdir(&(0x7f0000000000)='./file0/../file0\x00') mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x100) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x80000000000}}]}) [ 2658.731850] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue 16:14:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x64, 0x0) [ 2658.757513] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2658.783788] EXT4-fs (sda): Unrecognized mount option "7" or missing value [ 2658.794472] EXT4-fs (sda): Unrecognized mount option "sdripe=0x0000000000000000" or missing value 16:14:34 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) 16:14:34 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) 16:14:34 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x5b}]}) 16:14:34 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) mount$bind(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x80, 0x0) 16:14:34 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000}}]}) 16:14:48 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "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"}, 0x1004) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:48 executing program 5: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="4bbacda9a59269bd6d8ccddd45fcfec039512b0349becfdcc5487cf9e4c7653d3078303030303030303030303030303030302c00"]) 16:14:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8000000000000}}]}) [ 2673.286479] EXT4-fs: 6 callbacks suppressed [ 2673.286500] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2673.294957] EXT4-fs (sda): re-mounted. Opts: ,errors=continue 16:14:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff00000000}}]}) 16:14:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x3, 0x0, 0x0, 0xb88462, &(0x7f0000001ac0)) 16:14:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7e, 0x0) 16:14:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) [ 2673.309224] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:14:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf0, 0x0) 16:14:49 executing program 5: prctl$PR_CAPBSET_READ(0x17, 0x16) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x27) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000a1000000000000", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c65302f2e2e2f66696c653000"]) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', r0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2673.333664] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2673.338001] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2673.340925] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:14:49 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) 16:14:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:14:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xe0ffff00000000}}]}) [ 2673.408892] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:14:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x2090010, &(0x7f00000000c0)='}\x00') open(&(0x7f0000000180)='./file0/../file0\x00', 0x698d03, 0x62) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:14:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) [ 2673.426944] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2673.497419] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2673.499671] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040), 0x141000, &(0x7f0000000080)={[{@size={'size', 0x3d, [0x25, 0x74, 0x37, 0x6d]}}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1}}]}) 16:15:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112, 0x0) 16:15:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:15:03 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r0 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0/../file0/../file0\x00', 0x8001, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="47a1173f9d0dea4b3094f746d6089473f6988664c4baa20018b0036ba51ea96768cc2db824058f8e4b48bf606843aee17f", 0x31, 0xffffffffffffff2c}], 0x0, &(0x7f00000003c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x6}}, {}, {@nolazytime}, {@nouser_xattr}, {@init_itable}, {@nomblk_io_submit}], [{@seclabel}, {@dont_hash}, {@measure}]}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7, @empty, 0x1}}, {{0xa, 0x4e21, 0x0, @local, 0x8}}}, 0x108) getresgid(0x0, &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r1, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r2, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x1}, {}, {}], {0x4, 0x1}, [{0x8, 0x4, r1}, {0x8, 0x1, r2}, {0x8, 0x2, 0xee01}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x1) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getresgid(0x0, &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r4, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r5, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x1}, {}, {0x2, 0x0, r3}], {0x4, 0x1}, [{0x8, 0x4, r4}, {0x8, 0x1, r5}, {0x8, 0x2, 0xee01}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x1) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x8, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000440)="e26ce416c06c520f4ca76ee26584b0b1e2b90b059b42adedc8c6d2343718c3838b966ef613fcd1743daea5c244306e8ed4c6be2db44fbeb475b5642eeb5e26ea99462b2ccde79eca342462e671a5d7a808d91f8c125072dd6468cdda3e1fc54524f94de1d1b571814da714ac1c37691ddb52fedb", 0x74, 0x7fffffff}], 0x251042, &(0x7f0000000500)={[{@gid}, {@huge_advise}, {@mode={'mode', 0x3d, 0x9}}, {@size={'size', 0x3d, [0x70, 0x38, 0x30, 0x25, 0x6b, 0x4e, 0x36]}}, {@gid={'gid', 0x3d, r2}}, {@gid={'gid', 0x3d, r4}}, {@nr_inodes={'nr_inodes', 0x3d, [0x34, 0x6d]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x30]}}, {@uid={'uid', 0x3d, 0xee01}}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@euid_gt={'euid>', 0xee00}}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) 16:15:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d3078303030303030547f303030303030303030305ef95afed82fc412f67f71a32d95fa677032cb63cbaa776f39c61fcfbf92bd7ae7d7276fe89cccd1986c2f7d34fa9069a1c8847b236537930dcd957050255603d6f314f713"]) [ 2687.564083] EXT4-fs: 4 callbacks suppressed [ 2687.564095] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2687.574699] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000001,,errors=continue [ 2687.576413] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2687.583449] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2687.596526] EXT4-fs (sda): Unrecognized mount option "stripe=0x000000T0000000000^ùZþØ/Äöq£-•úgp2Ëc˪wo9ÆÏ¿’½zç×'oèœÌјl/}4úi¡È„{#e7“Í•pP%VÖó÷" or missing value [ 2687.603627] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:15:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) 16:15:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:15:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x100000000000000}}]}) 16:15:03 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x281, 0x0) [ 2687.633973] EXT4-fs (sda): Unrecognized mount option "stripe=0x000000T0000000000^ùZþØ/Äöq£-•úgp2Ëc˪wo9ÆÏ¿’½zç×'oèœÌјl/}4úi¡È„{#e7“Í•pP%VÖó÷" or missing value 16:15:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) 16:15:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970643d3078304782033030302c000000030097d72d4781a3db0000000000"]) [ 2687.657461] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2687.700989] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:15:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x200000000000000}}]}) 16:15:03 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) 16:15:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x200000005, 0x9, 0x0, 0x80, 0x0) r0 = open(&(0x7f0000000000)='./file0/../file0\x00', 0x80003, 0x16) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) mount$9p_unix(&(0x7f0000000180)='./file0/../file0/../file0\x00', &(0x7f0000000140)='./file0/../file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='stripe=0x0000000000000400,\x00']) [ 2687.708933] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2687.720448] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2687.755848] EXT4-fs (sda): Unrecognized mount option "stripd=0x0G‚000" or missing value [ 2702.393737] EXT4-fs: 2 callbacks suppressed [ 2702.393750] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:15:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 16:15:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x4008040) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:15:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:15:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x5}) 16:15:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x300000000000000}}]}) 16:15:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) setresuid(r1, r2, r0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x5, 0x6, &(0x7f0000000500)=[{&(0x7f0000000080)="dfc86b811664e76800ef6618eb00d8bb6121f3683b04083971a7b32738dbf1716d622c3703b0bf612b1b921d39777c11e25e3fc8bdbbdf", 0x37, 0x8}, {&(0x7f0000000180)="fe936c4a9089ba451b6f37c9fa998418428c6bc3f6fd1951e68ac9783e98429a8d9b9b04c7fb774bf1a767bb15248829c3f61decf07b82b62d6c6ba54c90d1400f3ccaa0f22d4185ff377c3dff31c0681daeafdfe9cbb9fae5c8865b10ebe924a22b09e592007a9d", 0x68, 0x9}, {&(0x7f00000000c0)="e5148de9fa63cbb06b8fb52dfcee", 0xe, 0x400}, {&(0x7f0000000240)="ec1e72a3a738a8ecf0f9c87432391a20a17d3024ac01d8ca4049d88a9bcf6e2c6dd55dc50147f678fa62d4ad72508dbce39ebace1c690bd88b2da841040144131998ce19404db48f519c4f4b293aa1bf03a24171970cb821a283f985ea89d60fb0b0b671e12077c11063e274400e4304263610af9fd0dd4e6912793f5c907833c46664ae03", 0x85, 0xc6b1}, {&(0x7f00000003c0)="c58b3b111124629e7eb9fa7b2ade373e0dbc85cf510d3abfedc2b8686b5c63c1557523206b7ab195952b5658f0855d2246a286edfe28203367f9b0f8d997728b9a705394a7cd635634975b31a6c2f95df1755eb073fdca4ab15da2d4f88363c6fa0a07999a947c86664679217dd7ef02c6a13b7b74e4958c5bdeac34aeb9bf7640d5c67c8e25eb88fb31a33e6d1d6901ef1ddc7a69821477", 0x98, 0x2fa}, {&(0x7f0000000480)="1b6cf86fd8f7bd5d5183c4545ce7a746ed05b6bdf5e1ea97d8c49a696db161c7766f9b58ab54901907d22e333a9dfb434ce58ac17e2a5f631e550c8aa3892240ce900cb7a5948cfafa443733cd12", 0x4e}], 0x4000, &(0x7f0000000740)=ANY=[@ANYBLOB='shortname=winnt,rodir,shortname=lower,utf8=1,iocharset=cp1251,iocharset=cp857,shortname=lower,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',context=sysadm_u,appraise_type=imasig,fowner=', @ANYRESDEC=r0, @ANYBLOB="2c0400000000000000de22688d6cabc91e040000000e699ee4efe044917b713d6449d4cae2000000b8597e5e9932afec22a5624bb4af3e0d9e9596426ea2ab56879df56a5141da2ab89abfcaa6b0a49cd5ed7b485f8731668a444df1fffc5670965992c6ac223f848b0f2ed756ee41adb8da4d83e0f4bca101e6a0cdb5ac941c90118f8963046d0fd6cd94f94d7aa177f62fb4f6de54e26e2e313558"]) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:15:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffffff00000000}}]}) 16:15:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x9f6, 0x6, &(0x7f0000001580)=[{&(0x7f0000000080)="26dcf5766b2636ad1ac5e40a51f052651b996d", 0x13, 0x1}, {&(0x7f00000000c0)="1ea2620dca92405c1707597f7ab61001d75121ec4d5b17ee70f3df463672965b5c40f5d802a0eff96f87764239d794", 0x2f, 0x7}, {&(0x7f00000003c0)="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", 0x1000, 0xc00000}, {&(0x7f0000000240)="6dcf2bf5aad045fee5bd0739fd13dfb74a77067bd89b27603725659b5424180bcb0ec4d0741f71cc7f3dd4bc16f09931ac05350011cc05c8aaf39e8df5665e21a7eacc5a62511b68ae2fb6af48bdf013eaa310b0e63dcd8f363590bae83062ce51fdf98fbfddefd2c1b2752d2433deaa32428304d12a708b6a6a98447b142d68bee4fd2b69c793ebf6d1bfc40ea615f36718c620deae4102003f7e", 0x9b, 0x80000001}, {&(0x7f00000013c0)="9d8a964f4d19a8fe28deb36650248288e1670d3836f1d3740a7e7e92bce54a3073ca0691344033e98d0b2ec7432769a2815113a83c46e2bccfcf9f957020746d97332dac846eb0998bda40a8e2c5a6879dbaeba870a41b9a75d3bc13444e69d02ba4e838c9f4f878f48d5732fe01a5177b74ad71e4ae23e822acbeab2113c53ac28c0fc0194156bd2f1b7feb5b39f2f8b84f8dcec4f920bf3761efed1c9c8c3d03f61c3317af113acd33b22a93cd4c831cbb106071966ac5f291e748d866eef34c3dd877355fc9ebf3c23bfabc8a5445c84e0c6871", 0xd5, 0x7f}, {&(0x7f00000014c0)="818859d3a67e1485d5f76a3b31d55ac28044f8385aadd11c8d8456aa6a0253d8c32461486c2fdfa0db60eabbd7cf29aa1cf5dd2f5d5b49569bb430c762a00f8cf12032a676fb2f862aa2fa9ef227e4cf94db80f1f5e3372ccc28122312ba7302f773084e782cc04d8a04ef48f1216654ccf8523dde7fc00148414ea015a14718aa5ae6048a49f94438deff0a7abb61fdf7dfccc5c8eb0caae944a1a34147a02d2c7f62cda1996d232a", 0xa9, 0x8}], 0x982811, &(0x7f0000000180)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2702.419336] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2702.424132] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:15:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x38c450, &(0x7f0000001ac0)={[{@stripe}]}) [ 2702.436477] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2702.437954] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x321, 0x0) 16:15:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x298460, &(0x7f0000000000)={[{@stripe}]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x40001, 0x40) 16:15:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x6}) 16:15:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:15:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) umount2(&(0x7f0000000000)='./file0\x00', 0xc) 16:15:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x400000000000000}}]}) 16:15:18 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0xa}]}) [ 2702.538207] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2702.545910] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2702.545910] " or missing value [ 2702.562622] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2702.562622] " or missing value [ 2702.575322] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2702.576681] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:18 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x330, 0x0) 16:15:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffff01, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)) 16:15:18 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='stripe=0x0000000000000%00,\x00']) 16:15:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500000000000000}}]}) 16:15:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600000000000000}}]}) 16:15:30 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x3f, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x1, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="1e97373013569f9c72fe6fa7dc2700285db0ff36a1044a44f36765fe6d7bb87beeaaf31c9f2badcf6b2868629739ff1467ac69f88aa73ed3f40f9862d378f5672d22929f1a2e2d6f1fdc5a4c3a54f5309c0a2db917a686ebded7facab590c351a655a6dac2a70f3fa08f0efec648fe50c3fe4482a54476e342e94d2759311db6b6a833a77b061e2a122990e1250f08f536967e2b251101a3cf427567531aeb84e85af91067f3837a0a14854ab6c56d973caa41c8632077b1775f2e5c32", 0xbd, 0xfffffffffffff5e4}], 0x1, &(0x7f0000000180)={[{@huge_advise}, {@size={'size', 0x3d, [0x34, 0x31, 0x25, 0x65, 0x74, 0x0, 0x39, 0x74]}}, {@huge_never}, {@mode={'mode', 0x3d, 0x3}}, {@huge_within_size}]}) mount$9p_unix(&(0x7f0000001600)='./file0/file0\x00', &(0x7f0000001640)='./file0/../file0\x00', &(0x7f0000001680), 0x4105000, &(0x7f00000016c0)={'trans=unix,', {[{@access_client}, {@posixacl}, {@privport}, {@cache_loose}, {@cache_loose}, {@mmap}, {@loose}, {@uname={'uname', 0x3d, 'stripe'}}], [{@obj_user={'obj_user', 0x3d, '-(*'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@uid_eq}, {@appraise_type}]}}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x4, &(0x7f0000001540)=[{&(0x7f00000003c0)="69765ef07ade7802ee67d474667c02ebf9f77011d054db91da040332eb59f9faff2d773b25c21590bde6225a6eafdd62dcec70e79619bbcbd3953261f326a10411da0eb3b24932d46b2c4e4dac63821cd0ee516965edc65a73b5e5a221d8c9f361611e429c3a326b1056f4d7bbec01f0b0576758c1a50351ab65184ea66f8725d2acbb7e21518a738221827311cb76c22c7d60ad554d36b66303b1bd451a", 0x9e, 0x1}, {&(0x7f0000000480)="3c8c4e2824fdb6c2d851c8b811396aa27bfc5cd65cfc922a366a1ead823915c8172c9076bba54a3bb6e8903f03caab475d53335f3b5aed1f77ee7af32d2d048a2290f3edb68c2a2b3957b294a4e709120c5aa86415042b4622e514679455a76e22afda4b5fa4f69548e7bc4f940c45cf0e3594955806e8fe585b03912e0bfb8fa213062c096b68517a5ff0243753f0f54d260d72b69f780cebabe1651c0997275fb27fb1e0df621f12bdd8342431ad4f2548a27b48534e750913825272f29cae59542b59e0309d1e0f83bc0f008dcc1107629acea790f4eb23986be83affa62cb6b59bb47ede0eb6d39119c5eddbe8ee402de4bfbc7677a4aed5a47b4423e798332430811994750fec701a89f412b85da7cb9b4cee6dfc0785d6964a5d55b04ee56449842f8d1949e1df9ec528895740db40bc719bcaae3f714d66bb6515cc4e169fc99ab256457107d2e88a5a20b07e9437153ea37bfac267e4997bf8c45eba896b880497eb76a4c01a9533b289958e67c23c3814f77f541a2f95e96888e809e76794f25d0d1f4cf14f42f3a27714032a3994c40aab5ba180ec65829e0786a0bf5e788ffd29ee3fbb6ed29912e4d6527de396c06cb90d3d62b0274f9315ac8bc827360950bdbacb77f50c79c384c3f089eb2e305d121bf6180a82ea863cb28f26972081f002fea4c8867457592295c0e7818830e7dfd13458d7a2f4d4a08d32201499110e0a22da26caa692cdad89d45e8e97e566bcb54dd8dfd17ba737aef28f13dcf141c528e8097587edb2b6165651370faf9d7e3389d007b14b80a7aba8ca4ec3def30fdc79b6347ae31c126a1984cc03cd4c709b5fe5b60452337827ec0be35f3a3c5a3ed213309daab56366d9b6e641e5012916ad0fdec7186cc851adbbf738f7de5f33353cab6f99b413d0455d1bc6d04c4a2d963b6b426f20a60236931e264a5034d795f93381096aa71992fa67c38e93286f1124d0d567efba53f901572ff664634f56241effbb5bd8e5bac15dbd8f1038bb12267b873a85be1465048f17389bc5649655092eba3d763200b5340ad720690fe94faaec9161f14af5736633681049ffe3f2310cc72682f0b37ac290e2645c802ceea81d1985695be2298ae7781504dac4d095eed2097348b6552ae1848135b14c81745ec2ed58e2cc0becec8e8eac34071beacc9e266895ecd6af0e80556bb48a4f5ab0be0703ab9e3db54e1d61c17f88cfff3ff864ebd6cfb8a72f4ea73961c4a9a97bfb0065b14b3e006b71731b72f78caea3f0a1c4082ced7869d4c28c9fa583a267d4af8061e6e526b5792691bc346823f69d90d125976da95cc9c64bf63e7a92ae79cec861a3fd836c5a7a0acd302bba0388f08549babb3e9043eee3b76a85ba08684443e2cc22564f1b9c3085ac62686e29b299c23e9e985422e3f767e483bb8bcdc1c317f15e2ec407000ea9ca572244fe763743c7d909269f221e8661941a809fddd20eb8dbb0cce19f1e27f722fa22e09d485ae5ce57ba448b31faf3ce537f740fbb036f4e76abd28680d97ad2f6ccb7e58318ca4e931dd36e5fe18cdfbedea13fb49ab60170c01c8b7846da55f5ed7d6c91d80a2cd59ab4d9160e5867a17be62f12de66e294987014d0216b3a31972db216bb02834db009f0a7a442fe3ef924974d6dd27bb1565de49e0655d9fe8683e6199ae6b3e9f301eac2f0a1eb6c762a16b7bd307acde49924041e0a6e173c63dc35a2188a3f686e8390b8dd0ff3d27050423204b2f4366fa22119f415f453bc7b14893fe7e9269b66c9c6c018a5d88fcfb5cf555cc5e3a456bb8d601704c5f575db55125921bc57307020cd9b2d8934b9c931451f08ff8b037274ab7f94d6db78c28dcf15983fdd1a5b314e73a935a79fb2ae5e75e58f550aefc850fcfd0dbceb42bbb8a4584dcc3c95692925be872da82f788b3081fc2d1c6d43d4bdeb8605232f671479925225790ba43483720e72e7c7740194144eb0b8b3dbdfed5674845a78c93390c4181aa6c51da2df98f3858594e3c7ef6fdc3eb624aec02dcbdc1f8c2d3943828a32abc8982955b089bc8e8792b8d89b020654c3694ac0a12a65db16ec8776d7aa1c8bd285c8c7b4e9133dc98e81e019f5b1db89f687448bb3e37435596f207c1bc9f8fc41c69d977cc9023dddfb6f669d624d2c22fe2fe40e426860f44c3dffb98eaaf04df907f3c67e93bed77e5395c67c3662fea14b879fb57aba0284ec83af4ced6ebbdcfa6588fc1b1f5a8eaf2564b3dc0d9f0893b6e2d2e84061f04df7c907734d72d44b0b88cbce8002341ae668604edbe560c14c69bdfd65ebf6529557211f4ca3ced8ee3d8a63d731e842c54573f244a103c62fa653acbb41ad42594e59d9e1b3a7a9326ccb833f5de717aa3c979f9b7f40ef98ac50d9089e5e315b0d424a9e97b18d7e0c6d1bd327e33ab442a6bd230f737e4b9d07281f5f9ce4ae36b6df6bd2c1b2611c1195eef452690a701a305cf4f103f94b17c5538590042ec9fea1822e39868385d77bc1a22cead2d378ad970297a09b1dffb01cd7c4af595a9f4c101dc4ea9c5b39591f1e25c60be353b3af0e57681f302a5bc960f00892fe34ffc71adbb03f5a0f06bcec0736e0b91eef0f88aff1efb844772fa99a76984cff19a6d46020398f72a19d10b74d12db6e5e2edad2ec50d17e40aad5148d3ca3c090befbb3fbeed69e77c79630155b94e22491c04f4e6cc51903256401fddb05238e4d75ef7670644df25e6a9f2228e9a464c9aa04a3a74029b6c5fb168c6ff708d33404a965ad20d9f80881298fb3573a5fb7e26b6f780411904a3a3c5ccc066720c9c844f7f15a10eef0936030f9fce76f9346b1af08d5a16c0db728e32e238bc0f67997d09bedd19c5a374c80730a08b5c631ee66525fa464a8fae6ae74047f4146c058472958ac8742d4af60b160af62b65add651402364f46a695fc71276f263878d60b52326df4e94a4109fe43dabef64e5f676323ce445f2b0d8351aab21a31d625466db8bb81552b180113fb9a2c3ca504452f7bf7d296ea4eb607a1855eab28e1c6b3cf653c172828aa54b8da228e60473b9aa45058794b83b4c5a78251df6dbab4d668e0385db41427628ee2312d5609a658424d8e534fb797ec2f5df1d69df5102b720fa9b9f916fcf4cf45e3b995c6f5cf6b1e3fe4ffd3bfe6d476870286ba5aad0368e9c2337d02a240f8abc2cc8f739d4406cc2f9ed5ba7f52d5c9233af0e41bd359e1c9f5ced220c6c226403669307debc6d93ab869a78db654a74c77be6d72bf7b788b8c359af01bc2a250ba3fa4e43181cbe6deb95d96683f1a34780c3f822697244499109f6d8b58cc1a2a7bcf5769f8c0797a4e6fd3fde45cec2fd5e2ed3a9e90e78c16df56ca584a1dc876c1646d68d75819db725bb348aa49008fa0a068d517f1bbb15a9a5a54346d039101f6dd2a2e9d0831bba889b8a13d6a108695aaab0d458181636ee39792da8f5ea96d1bdf10e1f82bad7362a889058e764236cae4ea9f0b9cca725a8e8ccca98a46e1aab3b97fce8752a0b46004de6c90b5cc6de2e5d515152f54c9f8084751d4261fc6068e4dc4315807c5ce4621b242ffd8eb376536cfc1fda324b79f7327de972445891fdcdf813eca2899f72be99c175056e4ce5a64481cffc8150c89b8e737728450c6b3c8e902a1583c8b6b94b130fef51f715f470fb25a7dd8d360e62715152392a4db6c7c3fc3f84c4f45b1fb16bd280652f8c5fac27adcb2aa8ddb962742919e478bcd3a8be4d50b9e0a750fa01910f4aaac08798cd20a15fe052766a4a2d6b81bbe86b8228209818dac430fe33463d11478de112ffe8247aef09cd274a964ef0b385205d30e21fec868ffd5cc61299c343bfaf93fa80d8fe42f0ad3a6be2d9d7ad4eec1a46bf8b93ab4ae6f3d1547e6cbe2a878dc0a7ad7ef6426a72b591cc65c3058cadad7d61bd8750206ab8f00ff644262eb93e7eaf6fc9c2b589b42257a8ab4ed66ad2d00168d3d68370a0a34ef4319f2dc750d0f0c538cf1df6b826f96c8ce2e232ff0764f18924413953bdb6d12f930ca8b439a04fe57fb084f7504c14e1035018f052f46fb0e51cb42e86e045c99aa3f9d05851f8d86afe178028302410b616d8778ce83ff224c4909e6bd092ad4c0682ba6a6785c584a19f4d19adcdb89656610f412244a761166e8ca3afafcb5cf2625addbd59bb72713664d2c244a8ec74ee52de3df34dec57fbfae48f4d6974f325c9d666b1b90dec13a3aca00f54e166c55f2f0b8d8e5bfab740f94458f3685485bffc02c263d45af651a3f7584d313632165c31b145a74ac3dd505290bddb2bc38be6e69f567d4ab74c66f10e15d6e0f5ff68f73fc8a136e8f6626101a9651b8d908bc8ce236c7ae19b4beed6f11a1447c2a6e13ebbf1da6abd864546cdee35e77f9e97e966a676a335c4169bbd62a89d15112e025b09afbe03aac6af71ed133a5b3bcceb923ede9f088728ee13b1be809c59f7c4a7622c632cfe6525da5537d6d4f8ddb0db70a84bc8d3683bdf2bdc30983e332e4f10a7b18eaf00c3c239918c08ecde585309d267c0c5dded669310fe91efa2b1b4cb23ed08f537f1c108889c9c1df8e6d0f74edc1514d907fa4d1da1631a9047691a07fda4b2f75adfec7a33f5f08efbd004b634e4ac7af0316eea7ca65804ed96a4c29e4c8ec53ee63e44362a4ac710bb12ce856a1c510625ee285ca59bc36d1f53da10d9d63a44cdc57adb86d8574a3065eb92cbc04a1e50857f523d1c1f64190a605c3609b89cf17897d4ff6025d7811674800c89ec085c4a8bd354e15c2f4987012fa335ba6ab1dc2be70bc480e7d5109363d06b5371ee5857e61a5c94a0b225bf7f32478b5a7d41891f619d1f2093c568e48a165af218bc9836ee39ea56d51ca9fbf97fa497dedbc4906a487e18ae0f959f01cab3f1c7125281df0d4c8f4d6fce00fea10b97880a9ce146f3d87b1ca2e2a405491948a7d7e10019844deb0ba597dd47f5b7764400cfd81bdaa065dc0ab945075270aff1264d79851845265cf67332e8845c364d33d1455a53b1b05007db37610ec37e2b5b1c9704683e050d130ec979f969ba8b2903e2331c5d8c6b0b678dbd89e59f26349aca0a8255e5962b1d2c8c00294d76b51b3f4e4fee83487400b1f03d5205ce27babe2131216b7edbda41e06f2aa9e3881e07ca3b80b2ac844e4d969433c031a2d21b40030459990bf989d6316cfcd6f9d5e871d32ab81d3d174acb211e7c6481994bb642dbcb226e30266adf6d18d04ea417c5762350fd4bcfdfb0100b520a7778e9b1884ad9224dbda949d86a35deda4cadbdabf8eece1bfec698179f2f59368b294b4ec87fed49160fa27a7ee3adefbeb608e735196ba3e150a0a02186a2203168064ef8ff8683bc37f4181632e982a256565370a8303f5e33f8b661b2d96e2273250d05668b83f4e42ca8f09476b3e7a8b4fd4f1f0c4bef23ee52f15407a8ca770cd363b6a672f91c30a4d4b57b906880ca897e25ea4c6001d907006abc6131b187532d75280b024d40c57c4834126dd4f8f841ec8e4d61445e317550881be4c3a39da8900676952813d0d8f185ac7e58e3a74d34cf74aeb55a204fcd72565c1304914733c27d895d4483be0fe50c6688bbdc1a5ce196ee3ca056e7b9635c21f90911956ce80e7b63156a7acd3e265e74ae42702fe9b5b18e049d5a589e26c066fa425cab147d9b310e13620c60d245ecb66a7f5c45562da025fd6c87a046269cffe34e0a2605afeac05548006266b0aba", 0x1000, 0x3}, {&(0x7f0000001b00)="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", 0x1000, 0x9}, {&(0x7f0000001480)="5b209f93873e4cacde1afab9c8bb070a05bf85bf0ac4705d7ace726cb93317e18195867385cbe3597a9b86f31cae6ab38efdd2aa77ad219da91bd8df7933bb26fd5702d3de6fae9376417fabed3730aa5c827b59b64ab7465e2fa63c3d0e27f6ccbc464247fe3fb4339abc972a360d779331f4e8215bbb8140c5e5366aad3b669ce050da875ea0917bb0384745c31ff8fbb3faba4e841b4df5f949961ee3a82434e5ef2798", 0xa5, 0x7f}], 0x121042e, &(0x7f00000015c0)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'stripe'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@hash}, {@subj_user={'subj_user', 0x3d, 'huge=advise'}}]}) [ 2714.716484] EXT4-fs: 6 callbacks suppressed [ 2714.716494] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value 16:15:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x430, 0x0) 16:15:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r2) syz_genetlink_get_family_id$ieee802154(&(0x7f00000003c0), r2) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xac, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_KEY={0x84, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "f063eff7b20be0d69676a0b453c6c47110bba343c81c1a67e86c0650d5844875"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x3}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x20}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "5806a5be015d37f1ec1568078b31060a"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "c76a75bf0eda891df746d2117b21ad2d"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x35}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x2}, 0x4000400) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0x4, 0xe8, 0x8000, 0x8, 0x1}) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x800000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, @in_args={0x1}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x78, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_COMMANDS={0x24, 0x32, "eed6d459c02ca459b7368c5943a3bf7104ae83a115359fcb90e9761aeae3a712"}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0xee}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_LLSEC_KEY_BYTES={0x14, 0x30, "62e65d3f37af0f30bf192cde166e2ffb"}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_FRAME_TYPES={0x5, 0x31, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0002}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000080) sendmsg$NL802154_CMD_GET_WPAN_PHY(r2, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r6) sendmsg$IEEE802154_ADD_IFACE(r6, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x411181}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x88, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x24000800}, 0x90) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000000c0)={0x8, 0x8000, 0x8, 0x10001, 0x80000000}) mount$9p_unix(&(0x7f0000000400)='./file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:15:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:15:30 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:15:30 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x500000000000000}}]}) 16:15:30 executing program 7: r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) io_uring_setup(0x4f76, &(0x7f0000000040)={0x0, 0x7410, 0x0, 0x0, 0x2c8, 0x0, r0}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) openat(r1, &(0x7f0000000000)='./file0\x00', 0x44800, 0x1) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="737472d0af4115bec79cc377b241bb8e"]) [ 2714.734931] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2714.743903] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2714.753236] tmpfs: Unsupported parameter 'huge' [ 2714.769438] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2714.780809] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2714.787901] EXT4-fs (sda): Unrecognized mount option "strЯA¾ÇœÃw²A»Ž" or missing value 16:15:30 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x480, 0x0) 16:15:30 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) [ 2714.805473] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2714.806492] EXT4-fs (sda): Unrecognized mount option "smackfsdef=stripe" or missing value 16:15:30 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) [ 2714.820225] EXT4-fs (sda): Unrecognized mount option "strЯA¾ÇœÃw²A»Ž" or missing value [ 2714.830834] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:45 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x600000000000000}}]}) 16:15:45 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:15:45 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:15:45 executing program 1: ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0xffffffff, 0x0, 0x4}, &(0x7f00000003c0)=[{}, {}, {}, {}]) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:15:45 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 16:15:45 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) 16:15:45 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) renameat2(r0, &(0x7f00000007c0)='./file0\x00', r1, &(0x7f0000000800)='./file0/../file0\x00', 0x1) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) getresuid(&(0x7f00000001c0)=0x0, &(0x7f00000002c0), &(0x7f0000000340)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x9, 0x6, &(0x7f0000000680)=[{&(0x7f0000000080)="30bd89292203ecae73a72beffc805b043e708cb323bfdaffa57029b376d6ee94d89fbfcfd9dd2fbeb98880ac8224c96c47819d902e86d53ed5c993788aa7dcfc77cb95cc885e", 0x46, 0x5}, {&(0x7f00000003c0)="adf373fc0d9c2de59db8ab1aa47eabea98f40a8664e5f161b0ca7423654c56a339140d68f04de23603964d76fcb2b5b4289eb4532c6680dcfa3df450e7101c5b53cd720304581c9dd474bc456e5f2bff6e96f5480fa1af0ed2f747b4c183b9134e392b5f3b9ee9fb05e778caae7f44ffd51bd16ad0dfef6d5b3f696b5c483de9b425e538a8ae1d0626dc2ca69b00fd4476c22f4a805edbdf26aab7d5c9b875b4af9f105e7c64be446d8ee10713536e0840d0c2cde6371cd4c2751da2a6410733a5732e1f8e7601073df3f349b02b1ba26bbd97a16628", 0xd6, 0x20}, {&(0x7f0000000180)="c8e2eeab5aa11046fe1c3eae2a11ad5ef05c4c4f59ea2c4701ba7b1241d70a78b319d90ae4d29b74fd6423845872199aeec90659fb2ea8447231", 0x3a, 0xbd2b}, {&(0x7f0000000240)="d12a9ab8537fb9788b31b4ac2f7b7a8b07febf3180376c6843e86cf214a784a4c812951ddb1baa2575efa5752d2872fb5580d12c841b9fd41d1e957e655692f99f62ce7987a021b8c1caa35cbee4147683af9bba3a30ab7bd15828f73ff9e543915557b27b2d92fa21", 0x69, 0x5}, {&(0x7f00000004c0)="d5b7f39412725d2c6d3f9928d73896ac69065cfebfca10b25422df55f6ca793b2852222b05acc00b92b3ba70e5c711752d0e2b2a54cc25915dfc7476cebed147eb6a8a28ee35d9204d573800e2862d13339b2c31ec96c9c4bb08f9bfd2c0296fea8f8f0d2d3f027a5e88078328054fe94167b09c5415803f0134882bf75f09c76efbbe77ea12962b8362161a49cd45ca88e1cb044d305a11299542007086259b29a10378e8113842f937b4d9769cc2fb29972d4507be0d36fcbb7214cf101f5039959af31cf672d70d23c65368a024809883666ee42f364453c8082e7370dd", 0xdf, 0x20}, {&(0x7f00000005c0)="05176ddd70cb4c05c466e69f5088a6a72d860c5096f34d11a9123152f06f7e790b3d9d58b3ae937638f155c809cfb8cc8b993e08becc80a64d18142ff5077fd2360e352e8f222ab5da114e28127e766f8bd6b38f8bb731e1551c7b866abd3781da9ae6299cb3f77af50971b1041adb74204b9cafc211d1ad720f7a53dba46c927c31bda95ee31f", 0x87, 0x8}], 0x2000a, &(0x7f0000000740)={[{}, {@data_writeback}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext2\x00'}}, {@hash}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@dont_hash}]}) 16:15:45 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="8e74726970653d3078303030303030303038303030303030302c00"]) [ 2730.254171] EXT4-fs: 3 callbacks suppressed [ 2730.254188] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2730.271800] EXT4-fs (sda): Unrecognized mount option "Žtripe=0x0000000080000000" or missing value 16:15:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) 16:15:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x555, 0x0) [ 2730.286172] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2730.291036] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2730.293582] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2730.298451] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2730.305514] EXT4-fs (sda): Unrecognized mount option "Žtripe=0x0000000080000000" or missing value [ 2730.318315] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2730.324238] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x700000000000000}}]}) 16:15:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x24024, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c0004b82a0126ec7aa465dd3818ff1107a2842efcc5c040791a27b90250e42449ef148589adf3469cea9b0a459b50f609912e225f4924b773dadc5769c1ce18b017cbb860d6adfe235fd217547b3cdbcbd3e88c671a1fbf70762ddd4a0bd5c396750c3287e530c628bf7d291a9c27d33b9634ef746129cd00"/157]) 16:15:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:15:46 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080), 0x1040000, &(0x7f00000003c0)={'trans=unix,', {[{@mmap}, {@access_user}, {@nodevmap}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsname={'fsname', 0x3d, 'stripe'}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, 'ext2\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsroot}, {@smackfsroot={'smackfsroot', 0x3d, 'stripe'}}, {@obj_user={'obj_user', 0x3d, '$}(}*'}}, {@uid_eq={'uid', 0x3d, r0}}]}}) 16:15:46 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x5b}]}) 16:15:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)={[{@stripe}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext2\x00'}}, {@hash}]}) [ 2730.500450] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:15:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) 16:15:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:15:46 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x800000000000000}}]}) 16:16:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x900000000000000}}]}) 16:16:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)={[{@nouid32}, {@grpid}, {@journal_dev={'journal_dev', 0x3d, 0x9}}]}) 16:16:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:16:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r0 = fsmount(0xffffffffffffffff, 0x1, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@private, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040), 0x60, &(0x7f00000004c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}, {@afid={'afid', 0x3d, 0x7}}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, 'stripe'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x39, 0x34, 0x38, 0x62, 0x0, 0x32, 0x58], 0x2d, [0x63, 0x37, 0x33, 0x62], 0x2d, [0x31, 0x33, 0x64, 0x36], 0x2d, [0x36, 0x38, 0x63, 0x34], 0x2d, [0x31, 0x64, 0x33, 0x37, 0x30, 0x36, 0x31, 0x31]}}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@pcr={'pcr', 0x3d, 0x31}}]}}) 16:16:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xa}) 16:16:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:16:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x2000010, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='3tripe=0x000000010P000000,\x00']) 16:16:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) [ 2745.539559] EXT4-fs: 9 callbacks suppressed [ 2745.539573] EXT4-fs (sda): Unrecognized mount option " [ 2745.539573] " or missing value [ 2745.549844] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2745.551765] EXT4-fs (sda): Unrecognized mount option "3tripe=0x000000010P000000" or missing value [ 2745.566461] EXT4-fs (sda): Cannot specify journal on remount 16:16:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, 0x0) [ 2745.580691] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2745.583047] EXT4-fs (sda): Unrecognized mount option " [ 2745.583047] " or missing value 16:16:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) [ 2745.593236] EXT4-fs (sda): Unrecognized mount option "trans=fd" or missing value [ 2745.604622] EXT4-fs (sda): Unrecognized mount option "3tripe=0x000000010P000000" or missing value [ 2745.612851] EXT4-fs (sda): Cannot specify journal on remount [ 2745.620744] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:16:01 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xb}) 16:16:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xa00000000000000}}]}) 16:16:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:16:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) 16:16:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='stripe0000000000000,\x00\x00\x00\x00\x00\x00\x00']) r0 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x100, 0x104) lsetxattr$security_evm(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)=@sha1={0x1, "a58f03557ea8cf10a9525b36ee2b2645a5bec66e"}, 0x15, 0x1) mknodat$loop(r0, &(0x7f0000000280)='./file1\x00', 0x100, 0x0) uselib(&(0x7f0000000080)='./file1\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') 16:16:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='.\x00', 0xffbfffffffffeffe, 0x0, 0x0, 0x288004, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x7, &(0x7f00000006c0)=[{&(0x7f00000003c0)="f6ab31cad40fe5c77921655b05ba3b1f78abae57dccea75f65d153af3a4f15f3d6d65db50add8e33f2facab580faf6eaa29cacf86267306cbc20febee1acb0c02c2aaa2e213ad88fe9f32d33b3995e37dbbbc852d0466467f66f661565ce8e8ed48f61006b805ab34e6e8688e6de3873016fe815de026769b6d80e9f8d44da6514977233b57c85f46d848f2c63992a0d96f1682d3e38d766681b0d13248fcad2430bb1fdf4d8c9e8565b78b713b9feebd2b9d6a0f1d2b42b4c0bf230be1ae5ac5d1bf6612a03dfc1a2437150aa4350537eeeca0b7acd29e72c4ac9b738886e2e68dbace614784ba83618", 0xea, 0xf0b8}, {&(0x7f00000000c0), 0x0, 0x37}, {&(0x7f0000000100)="931e", 0x2, 0x2}, {&(0x7f0000000180), 0x0, 0x100000001}, {&(0x7f0000000240)="2d40578e561b3ac09956de7dcd16f73804cd6e0bf3834e702a2bed2c843fe1d8e65c4fed010fbda93bbe8711a101bb5a441f448e673295269021e1230b40649af0052547f7bee254051f2660bd872e544642846c29db4b692f8c5466fe71d6cab7", 0x61, 0x2}, {&(0x7f00000004c0)="eb77af0944e5ea2bb4508a41f8886c3ff94fda2ab9d6975a5544a1ae7190e99c17eccd839c296ea5b2563742cf38d5aba95b85011073f5fd394917f7450bbf372e39d69f511fd68641f77181b90504e14d9b49ae509a7efbb1edd2227f4b7498f48ef9090ade45d4aa280ffb808140d2845ae199a6b387fe0ebd1de2a7dd3e7b1f0399d043d56ba2849065b47f5eceb10692c87bed8da9bd226b259dfb11b072819201f014cf41585eab1b0334f5cd2dc1582330e0441da368b69308e8a95309fec84a8eda420190bb1b0929e99af335d5b657f8cc0f1832409173eb73d7b940eaff3ee86c4c2b5b4521cff957dd865c756a7a2b1bf8a6", 0xf7, 0x9}, {&(0x7f00000005c0)="3bb03a823c8eb51464aca015af661af31e73f1b62c30043acf8cc76048eca828f52860f80ebcd66a97c485ff72c2e94920d38f451f801dfa6149617aa9088934a0cb1b0f70ebd09e01c98c9b498378a0be0da5b4c1bc7e8a93d7f5290c5084206fbab95c3bd6f22bff93932320879f043fe11c84ba5da235ecdbc512564e3458e7a9ee926d06287186cb0ac0bb12bb71c695d798bbac8a42c13d5b5a315787338a1abdf8c28696d33907d819cc4fa1dbd353b5f3e3ab346422c04628b795d05eddf9778b105bb84f73867f149ca7813352", 0xd1, 0x5}], 0x4, &(0x7f0000000780)={[{'stripe'}, {'{s-}\\m/-]&{'}, {'ext2\x00'}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@measure}, {@subj_type={'subj_type', 0x3d, '[-'}}]}) [ 2745.806473] nfs: Unknown parameter 'stripe' [ 2759.968313] Bluetooth: hci7: command 0x0406 tx timeout 16:16:15 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f00000005c0)=@l2={0x1f, 0x0, @fixed}, &(0x7f0000000340)=0x80) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000700)={&(0x7f0000000800)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000426bd7000fbdbdf25760000000c00990006000000090000000c0058000900000000000000df4c3fdefdf2711a13ad9c288a1e53cd5f0a6efe2121c5f8146d687df9acc239b8ea75b27cc800c6123c5eece7ee2def9e94936d5a61ddf89b7f3172e5edd4a4ba91d45d1dd66f1fda484ec0e9f92b4704a1ac288c14e11cfe9532a88914fb7dfee37883ad18abf062c27fbc223568a2b56d666aef47d0f65fa32c8f5f3b5b267945d8d12128528094f576b9c020a2059c93bf3965434711d6d2ca9eac9231a59b926311bb939184a3d037ac4343ab1f08ac6039894a4a5f5fde7ad37d986bdc96ae5abd11419cc50e4b857bf9f64bad59352e6f5ea94a59b7e037be223ddfe3197b144283ac"], 0x2c}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r2 = syz_io_uring_setup(0x4d4c, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r2, 0x0) syz_io_uring_submit(r5, r4, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r6, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close_range(r7, 0xffffffffffffffff, 0x0) r8 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(r8, &(0x7f0000000140)='./file0\x00', 0x95) syz_io_uring_submit(0x0, r4, &(0x7f00000007c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r6, r7, r8], 0x3}, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000180)=""/32, 0x20}, {&(0x7f00000003c0)=""/184, 0xb8}, {&(0x7f0000000480)=""/155, 0x9b}], 0x5}, 0x100) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:16:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0) 16:16:15 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x10}) 16:16:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x388440, &(0x7f0000001ac0)={[{@stripe}]}) 16:16:15 executing program 5: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x13c8084, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_uid={'access', 0x3d, r0}}, {@debug={'debug', 0x3d, 0x2}}], [{@euid_eq={'euid', 0x3d, r1}}, {@audit}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="737472697065312e6d17b132a53330303030303030303030302c005a3279c8ce31c09414ab0cefb01e3e4f854a421b19fd3b0487c9aa476981cc9d25f2b5a5dd084b4fa88ce5e7d3e3d49dd0576f766f5ca668b9c3e80004000098aa"]) r3 = eventfd2(0x0, 0x800) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000540)={{r3}, 0xa, &(0x7f00000004c0)=[0x6, 0xffff, 0xffffffff, 0xfffffffffffff000, 0x1f, 0x6, 0x10000, 0x7fff, 0x6, 0x8000], 0x10001, 0x1, [0x40, 0x101, 0x4, 0x2]}) 16:16:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xb00000000000000}}]}) 16:16:15 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:16:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) [ 2760.157436] EXT4-fs: 9 callbacks suppressed [ 2760.157450] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2760.182221] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2760.187477] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2760.191408] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:16:15 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) [ 2760.208093] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:16:15 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, 0x0) 16:16:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1000000000000000}}]}) 16:16:15 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4}}]}) 16:16:15 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) r2 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7, @empty, 0x1}}, {{0xa, 0x4e24, 0x7ff, @local, 0x8}}}, 0x108) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0xffffff62, r0}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x0, 0x0, 0x2000, &(0x7f0000000040)=ANY=[@ANYBLOB="ccbc726970653d307830303051b7480dae1a37018bcdf5c5303030303030303070303030300500d9ace64835903b2ff77b96b85d2eda61d7843e8b5303f4dca8c8562f8bf2d1fe0ca7f5f4"]) 16:16:16 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) 16:16:16 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x18}) [ 2760.311860] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2760.328329] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2760.336869] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:16:16 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r0, &(0x7f0000000000), r1, &(0x7f0000000040)=0x400, 0x2, 0x3) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000240)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c00c18d9080ad58b23b02eb8563c6a85355710fb76db924f26dee7b3202486abf4975ffa5b69482659e3fb9328e6092072f57a5f940a0bf9edefc2563174f414874db3200ae462ddca953c1a0f4df1fdb92263b5a32d0c01683c326f30831ae549283ddf15f8b06a62fc5d3009ae3f16a1039118086232d8463999cf9e16b7412299b048abf710a4cf9677a9687"]) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) 16:16:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x131d000000000000}}]}) [ 2760.356145] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000004,,errors=continue [ 2760.370783] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:16:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1201, 0x0) 16:16:31 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x1800000000000000}}]}) 16:16:31 executing program 1: sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)={0x1a4, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x0, 0x7f}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_IE={0x134, 0x2a, [@challenge={0x10, 0x1, 0x5d}, @random={0x1, 0x2, "edf0"}, @mic={0x8c, 0x18, {0x4ad, "cbd69d4e9308", @long="da9e01f7d223c3da90978db470ebb8c8"}}, @challenge={0x10, 0x1, 0xd7}, @rann={0x7e, 0x15, {{0x0, 0x1}, 0x2, 0x2, @device_b, 0x9, 0x7, 0x1000}}, @tim={0x5, 0xf3, {0x3, 0x70, 0x80, "2a151caeabd65515fa58de54d2575a26016d6f2fadfd72f016919cc51caff360d58cdfbc798b1d9977ba2cb84f88e6a8305acf72ee6d5dc4e3fd83189d9f3e7c218855a4b2d60d62f7946bd7d96fb4cc21cb402584a4954d5723cf41d18a01575f0c71b274f15d65463aa7966ee8b2394dcc0aa8f32cbb1648ced4ae71fae060d0242611ed92b18b8d846bdb83ebdd714d951e6feaf2b0768a88445c66f7bb03d7da24b1b18c2b0530567a8905e12e8df792ea85b6cc01ba6d90d87c9683c177e225ca1d927f39b6f560a2beaa12a2f7f498f06b2d1a8f0a6dda6e1aeabd5de05a6eed94783d20411f4507a591f4ae28"}}]}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_IE={0x26, 0x2a, [@cf={0x4, 0x6, {0x80, 0x2e, 0x8, 0x40}}, @chsw_timing={0x68, 0x4, {0x1, 0x275}}, @link_id={0x65, 0x12, {@random="445bb9455028", @broadcast, @broadcast}}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000}, 0x24040845) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:16:31 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:16:31 executing program 7: r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@i_version}]}) 16:16:31 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x5}) 16:16:31 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2000040, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030000400000000000000"]) 16:16:31 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2e}) 16:16:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) [ 2776.164809] EXT4-fs: 3 callbacks suppressed [ 2776.164828] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2776.171484] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:16:31 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2103, 0x0) [ 2776.187174] EXT4-fs (sda): re-mounted. Opts: stripe=0x000000000,errors=continue [ 2776.199229] EXT4-fs (sda): re-mounted. Opts: i_version,,errors=continue [ 2776.200816] EXT4-fs (sda): Unrecognized mount option "." or missing value [ 2776.207571] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2776.215784] EXT4-fs (sda): Unrecognized mount option "." or missing value 16:16:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374725170653d3078303030303030300000000000000000000004"]) 16:16:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x2e00000000000000}}]}) 16:16:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) [ 2776.286925] EXT4-fs (sda): Unrecognized mount option "strQpe=0x0000000" or missing value [ 2776.311752] EXT4-fs (sda): Unrecognized mount option "strQpe=0x0000000" or missing value 16:16:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x6c1e000000000000}}]}) 16:16:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3700000000000000}}]}) 16:16:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x6}) 16:16:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00') 16:16:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYRESOCT]) 16:16:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfcb, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="43e7d80dfe6a20422e730a540c4813ebda2d77a41c46eef25ca0cfcfa71ed865efde15ed6069d25dbfb6d3baacec67eff34113ebae67a229cc56202a0e33fb5bc86d19af430fcb2973b03dec67228f6dd2d2078adb93442cd59fd8f78510a26807dc8ca335d726924cfc281190e00c4e8dd793812633c77bd131fb1a051c90de387ac2cee1f8213720a14215ceafb03b1f4d5f0d71e3dee83e37c77a10b1a787df9e29bb252dbe1b6f048b4ac3ee30cb906282", 0xb3, 0xf38}], 0x80, &(0x7f0000000180)=ANY=[@ANYBLOB='utf8=1,time_offset=0xfffffffffffffa9b,iocharset=iso8859-13,shortname=winnt,nonumtail=0,seclabel,euid=', @ANYRESDEC=r0, @ANYBLOB="66eb"]) 16:16:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2400, 0x0) 16:16:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x37}) [ 2791.514384] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2791.524477] EXT4-fs (sda): Unrecognized mount option "01777777777777777777777" or missing value [ 2791.544437] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:16:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3000, 0x0) [ 2791.564389] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2791.566344] EXT4-fs (sda): Unrecognized mount option "01777777777777777777777" or missing value [ 2791.572644] EXT4-fs (sda): Unrecognized mount option "7" or missing value [ 2791.577594] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2791.584659] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2791.586640] EXT4-fs (sda): Unrecognized mount option "7" or missing value [ 2791.592579] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:16:47 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:16:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:16:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x4000000000000000}}]}) 16:16:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x7, 0x5, &(0x7f0000000180)=[{&(0x7f0000000080)="921b48df9416f80640f8990cc260ce92b6baa3564999fd84adf3dd2eefd56c20b94053a0ca954e3f12d8a227c86fcc4c918ef252f322809f1d7d63", 0x3b, 0x4}, {&(0x7f00000003c0)="9ade5627bfcfe88d6153c2f5c05022858e714e11778e2672c6c64f4670eed3d36bb97ec77a42be82808b644468548b1904bfbf109214902e29b716cadeedd6c6a8a9bd96dc8094db72c80c55106de02b61925bc27b9aa1ab7cc9de735c71f94f45921124ddfb15d3855879ec71312117810e8082a0306f71452db0eb5a741899f5310750c1d984586fafb6a927f45c972d61bc0a5e43ab25fa1c834d25effe2f3489446e34137059e29690225551d9f97b75a07bce6a8a92a5bfb90840e020e617946be466f239b313ee817d4f5757a30333ceb971fe64993192d6099b41025ba4688555f26fca9cb8e1d187f7", 0xed, 0xc4}, {&(0x7f00000000c0)="a3ff0373ae0716b824c4a98f704f", 0xe, 0x80}, {&(0x7f00000004c0)="c401bd69cd900f8d64f13240665a1dfc55ec49a3d37317a1890cf01efd0e68754d1a7b85309e44ca518d7441c994aa7d3dca4765fa1b9290d42fb6bee8a6d0748bbaa30b1dd11158b01704da398e7413719db2798262d17313638c210938c858a60bcd9817dc2b83acf694b2b74a10a9b9467dd1dd05da4e2da98f021391f2ad7cbd90e5848878c4a0715703b9185c0acfe914730c9a78b29d7cbf8a7d35bb2faa3d88b171a69240e2c7780396e118a914aed821444ebe5659815afd7a3382ea1b9a9e602c3bb30f0e684631d771f31857981a420dce36e14e06b7ee0fbba7e179ed", 0xe2}, {&(0x7f0000000240)="9a45ebeb49ffe975a24e3803aa1c784ff501c9c94dd9f0886ad5ff7da984bffc292bce1712475c74df499cfee38816ce5d8a3e03c728b0b3108f9fed6d719c4e7de91f0ed37a892f8e6d1b50c6ec83dc292f9b093960f70eccbd99591d9b32ad5192f13d2ba6af37785582624590e0413d79589c2f4ec436f62b24c793da5f9a852a537050a9b62b79768616de566e422f761f17fcb36535d24b3d90ee97efde5cd34719", 0xa4, 0x4}], 0x8, &(0x7f00000005c0)={[{@uid={'uid', 0x3d, r0}}], [{@hash}, {@dont_hash}, {@obj_user={'obj_user', 0x3d, 'ext2\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@euid_gt={'euid>', r1}}, {@pcr={'pcr', 0x3d, 0xd}}]}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374728a70653d1678303030303030303030103031303030302c00"]) 16:16:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="737c7269159e3e2578302c00"]) 16:16:47 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x501, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="58fcaa9ecce9303b69e87be1ca643fbc3518fb8fb231f89b9e68348185646f721519164bf288617181fe682eb9d56a8f03084e0e0a2106aa75f89bfaae40ba518668f47adba1f053364af18c0e904049d13a5f8795a91318dd63fad69d49f63e28f6d2c29f96e813a66ff38f9b761a", 0x6f, 0x3}, {&(0x7f00000003c0)="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", 0x1000, 0x4351}], 0x40002, &(0x7f0000000240)={[{@shortname_mixed}, {@rodir}, {@utf8}, {@uni_xlate}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@appraise}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@dont_appraise}, {@uid_gt={'uid>', 0xee00}}, {@obj_type={'obj_type', 0x3d, 'ext2\x00'}}, {@fowner_gt={'fowner>', 0xee00}}]}) 16:16:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0xdc, 0x4, &(0x7f0000000b80)=[{&(0x7f0000000a40)="99", 0x1, 0xfffffffffffffeff}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)="ae62c8c11510c7cd482f3d566325c051966addd5a43424984c8216cf65d676d5970db0bea63e6cf7347e141fac40fe0141cf8e1f9778ea66b3695e7d5215a5bce7e37c6f7f6c7c73766201704e452640", 0x50, 0x8}, {&(0x7f0000000b40)}], 0x80802, &(0x7f0000000c00)={[{@journal_async_commit}, {@dioread_lock}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}, {@nogrpid}, {@nodiscard}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'pcr'}}, {@smackfsfloor}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@measure}, {@smackfsdef={'smackfsdef', 0x3d, 'nfs4\x00'}}, {@appraise}, {@pcr={'pcr', 0x3d, 0x35}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) unlinkat(r0, &(0x7f0000000d00)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f0000000000)='./file0/../file0/file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file0/../file0/file0\x00', 0x400000000000, 0x8, &(0x7f0000000900)=[{&(0x7f00000003c0)="41065afb6cb5caad7d0f53f3e4738e89de108920ab2b71d2cb04e01bdac6d2bc4638b3f7a28c38b5da695b3c04de18be5b149601bc741aac63abdc4daa84b782a291b596ffea7ae50e5404242db576f9bcb30fc39814212deba7bcd1de69b010f98e04e960973bb75798032e3b59e899b7aaefedbc3a6a9743b9038e7cf1e5955b9573302f63412ea38cfe1d07706ca7f73be58a9843c0a4cb568c0a79ae8e9288a7cec21add0facc480c2dd41fd6c7ddc2fabd63d5a25683b5e3c310e33ca8f2800dda191c5b11c10625965e055243797346df5c5800f798b560dd3df84307ead4d73a40926632092f9da4e6bea92ca7241", 0xf2, 0xffffff0000000000}, {&(0x7f0000000240)="9ed5dcff688ee61781d057bbc17e9fc930c80fb82c3906f8bec4527fe7bb7d5b98ee5c690068dfcab518a68d63b96680fd3703fa9aeb36e4b9dcaf9c985c040b77534084", 0x44, 0x8}, {&(0x7f00000004c0)="3441bc6853caa3b77387a78a6de00e334f7e014b123f6fa0fc91c301e26193339b08ee256473f60d623a37e5cc6f64bf52c3afa67ee4e06767a9311028e0fd565ed1d5f5fb1516de7e7b5694309eab2fabdf009b9c70989a37f2f2b2f158ae5582cfb68c3a77c8f39637940c9e5ec15d63b19f48ec8a2693719c25aca2b4b9e585f450b7b4fd7111df1af6d494a5ff9339fa468b38", 0x95, 0x7}, {&(0x7f0000000580)="36d2f70d24aa7e97c70d11c504e2178f0ab798e4094c24a241eb5dae08d7b39791026c1947fc36898380aff08389f1b6ca02856294ea0078ae2b9b9f1617f654e49de3b707d235fdaae45d8fbfb1244fc388d5c3750271752cecfa6c7c492828d8b94df3ff5d8c0008b2abeab4ac8e70874e0dc4b422e8be4558bde5bdcd83143f378d8c42a272e6bea0c94eb186b26f2d53345f377c24c9eb362f3d461631d97105243e29adffb38596a23c7bfdaaee84438d60013a1f8079b297b9703412557fab83b984af032e511269544e46b5", 0xcf, 0x1}, {&(0x7f00000001c0)="a195f5ea88c2829a20f5a4da1618f666e0daa1d524de3e6189e2e60c4bfd9e8883cda99993cca7524b2537d5d3a22038174dfba41d899c91550113f677c264", 0x3f}, {&(0x7f0000000680)="6cd2a4316d19635c64cc2a659fae6839deb3adf0f1b66ba878832e45bd4e0fd7f1612a837c7b1f96c4ed4fe1cdd36332d4830cbbd4f4176e0d14a51581db630bdc33552e7527a867bd5050dc60beb76dad9ff025662bc6899b2185d19edd8fab534292a5f158a6c98632c2b2ef0d687611f7d37bd2038a0c73fe20ce7fadfd334f19657c2446fac1c2f1e2a4c7233929d7324d16934eb4c1d6", 0x99, 0x4e0}, {&(0x7f0000000740)="a23665d8c2a2bda3734b1d6a0a4118be7f358eded33885fa156dc1b365e6114898ed5a4621a3eb640508ecf8eafdb97fec65089a68dca50d5fbe813c8b876f71b2c2e462aacf747e7ee2c0771248fde77bc4e3057e8120d3b4bd933e557c8f44465ac14cf9911b3dee6f0f4936d101df43902e77c70e041417f0c642dad6036050a5ab9bf09dc83be2432e5feff1e735be297b0f58900a7887575f330ffd3d52428ecb013b198bac6c2393a067edf4c360e50d0bb2b4e2f392c7bd6dbf4460368128d2450e85d2aa09514dce133444f95da876ba3ab387aa70de8bad7e8d084bb819b5ba91dea9fbcbb2dd3cbde473682905fa0a70", 0xf5, 0x6}, {&(0x7f0000000840)="b673ff5a25cfe141b41e6385babdd6c38cd230847df1432a8ce48b7ce9cc080228d8c42cfdb7c31a2176aa6bb9b6360f64ec988076ec21ba7e9dc7b5503c382a3e012e93f1f18a47c316db5893f660beb889315df5f5504564e5eff4f8317a7ae8465a536727489c892e854e25c726e88c9c321a0b59df5c493932b033d9f8d2ccd1f2f6831da6476d2eeedeb5ed14a4", 0x90, 0x94}], 0x140000, &(0x7f00000009c0)={[{'ext2\x00'}, {'%{:@'}], [{@hash}, {@euid_gt={'euid>', r1}}, {@fsname={'fsname', 0x3d, '\\+,'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) [ 2791.703588] tmpfs: Unknown parameter 'hash' 16:16:47 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3003, 0x0) 16:16:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x53000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000140)=ANY=[@ANYBLOB="7374726970653d307830243030309b303030759530303030302c00a1069c544082bb6c18fe48b78af01bed3212aed3d910ec6b288f"]) 16:17:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2c2060, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)) 16:17:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) 16:17:01 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) 16:17:01 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000180)={0x0, 0x2}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) creat(&(0x7f0000000680)='./file0/../file0\x00', 0x2) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close_range(r0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mountstats\x00') recvmsg$unix(r1, &(0x7f0000000640)={&(0x7f0000000240), 0x6e, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/53, 0x35}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f00000003c0)=""/189, 0xbd}, {&(0x7f0000000480)=""/181, 0xb5}], 0x4, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x10100) accept(r0, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x8cffffff00000000}}]}) 16:17:01 executing program 6: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2, 0x4, 0x9, 0x9, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2805.535898] EXT4-fs: 6 callbacks suppressed [ 2805.535911] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:17:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3004, 0x0) 16:17:01 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) r1 = open(&(0x7f00000004c0)='./mnt\x00', 0x58080, 0x15) fcntl$setpipe(r0, 0x407, 0x4) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) r2 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7ffffffe, @empty, 0x1}}, {{0xa, 0x4e21, 0x100, @local, 0x8}}}, 0x108) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f00000003c0)=ANY=[@ANYBLOB="77feb133daef9dd81f8330303081170000303030675fb75bc8c230303030302c00d3ae371a622bc7fbc3a1e05b5fb528b4a5a3714ed2e67b1aa0c757a7b0d78efc3e042cd501ca741408815a6a80cf84a45a305a5a9152fcc4d8855af7739f4f2f4818c45d7f2c02924c106b927f7ae251f2f5df79661f5bb728201d9ec7eaed74f20700000000000000e1d0696a52cf44fef5e22a5d4ea207f971249df35ca65f3e675249e34cfe03472d341aa0e87c0efd381bb3113390be9253b417b2ee0f17b045e115b736c147f20e00ba165779145a0bd701b4a63e52b66834e413d056cae0"]) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) symlinkat(&(0x7f0000000000)='./file0/../file0\x00', r3, &(0x7f0000000080)='./file0\x00') [ 2805.549459] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2805.550891] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2805.553498] EXT4-fs (sda): re-mounted. Opts: ,errors=continue [ 2805.568633] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:17:01 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) 16:17:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffffff00000000}}]}) [ 2805.584814] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2805.586767] EXT4-fs (sda): Unrecognized mount option "wþ±3ÚïØƒ000" or missing value 16:17:01 executing program 7: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f00000003c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r2 = socket$packet(0x11, 0x2, 0x300) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000), &(0x7f0000000040)='\x00', 0x1, 0x1) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2805.619151] EXT4-fs (sda): Unrecognized mount option "wþ±3ÚïØƒ000" or missing value [ 2805.697559] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2805.715647] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2810.208365] Bluetooth: hci5: command 0x0409 tx timeout [ 2812.256317] Bluetooth: hci5: command 0x041b tx timeout [ 2814.304307] Bluetooth: hci5: command 0x040f tx timeout [ 2815.420986] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2815.423128] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2815.426480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2815.471029] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2815.472947] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2815.475305] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2815.624646] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2816.352297] Bluetooth: hci5: command 0x0419 tx timeout 16:17:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) 16:17:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:17:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xf6ffffff00000000}}]}) [ 2832.410884] EXT4-fs (sda): Unrecognized mount option " " or missing value [ 2832.430792] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2832.430792] " or missing value 16:17:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x22000, 0x0) [ 2832.452167] EXT4-fs (sda): Unrecognized mount option " " or missing value [ 2832.460136] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000 [ 2832.460136] " or missing value syz_mount_image$ext4(&(0x7f0000000340)='ext2\x00', &(0x7f0000000540)='./file0\x00', 0x1, 0x5, &(0x7f0000001800)=[{&(0x7f0000000580)="51963ddb", 0x4, 0xdef0}, {&(0x7f00000006c0)="1da8dcba045bbfff26b2fe750427005d18fb9c887c5bad475d1e65dbc4919eadde4ccfba31cdd41ec686f7ce829806402e57642302ba6720988b62f6ce11fdcfece09b6abc1da79eabcaa5b022cd8dec4457953e86cc8ca32182f883056de2d4e4a7eb4198dcc30f1951401226c3014f3e08521bb85950202fe6c173e138f6051b45697ea3b62c1deb6330b83511b5f1e89f44e1", 0x94, 0x7}, {&(0x7f0000000780)="807f1b1609f62e162daae45760bd80cda8ba0a1977e7a9dd7dd7c5194799ffd5c313e6e20f404d4cca45113e6015017fed2175b5bda765368de40b9f2285a09336adfdcefbf9621ed378c01a78b03d1a1a5e75ab94710c0400b8f1cb2f96f64fd05e3ff247b007c5002fe09053bc4da9f34733d4a816fac57123f1d2", 0x7c, 0x9}, {&(0x7f0000000800)="d7f64f7a1caa1a071079351b1173dbb22ed34b96f04caa238b24fd9fff0f6477f15703a0e04a5f56314a38b67c31945fea6aff1e005967980155ab92314323a9ee657f8ac71e9b4bf7e13532431a7e9fe2d9857177a612bd95e3029da8d56fe395380cac079dcd2b1772009e818643849e4314c818709e261983f13b3c9f81cd43d0da7ced3218aceb8e8f74e32887f95d5f32987e93fe098e621c2e739a1a496572cf7222e29f92d0ded3838213053f92666e4c02e07d776ebaa9110cc73c98d0fbf82e7b363ca3f71a42728713bd428d3d3bf5e8de84933b241b8e612c60b41021fb247cd161d154742c21618145f80903c7570818f0e3fc0a009a7602b2570c75368877663030d025af8aa96fc1af66be1538eaa2a8075ca2d4309ea041741fc5fedaa1decf05fa2b268e7eb627632bf6a89addbcb3bfb271a67b80865922f40713dcd805b427982708aa07356b240606601b13437a489355009a0d08ac1c4dc125552ca873e7dc5c6afa6c2b6e7523c39070d00958344cb0fe6394509841538b23b033d48e45c4c44e97eb5f6c0eb987276fba73ffa5500d1087f7e99669ce42061ed91670c219a7b35d419a5e1c99a37b218edb3cf0b300c495f6644cfc44adacd7cba596aa95591dd9c941d8f18ab99a3c106c4a5548ae7fbff2072fd44b846b522292c3dcf3f9a4e9361b367a2cf7cbd9a154967b19ed7302e4746828084a5013224d292f44120c808897786715b3db6c155c71d05355c642c0576d90aa6020340c6363c2800ddfee4bfc16ed0890d202db5acf9a359022755edcf619aadbfd6e9a0c9d44136fbf4f6fc7b92dca0b02d84efcf687848b41a2c02f87421b56807dc62d4b8ac1c870120ee8bbdaf0985815a1d6ccff0bdafc6a09d0a25fcc276471bb2f5f897f85677b9429af82ac53a924099a6d8f9b70567fda0f085a733912ef8e55bef787853f54a17689794254b47ec4ebd405a61c455c32b07df355a55082be5c065463b49f451c3ae8ea3f5976c44769cbaf2e869559784a0e1cc16535876f291935e4d72263e879008d347e1ceae5219c523e1027188451659bedfb6aeebc40e76759ed71f616eab4fa8f769653f3a0c498e9ed231947c53048630de257a352ff68eb96c84d567e99facde656081390f69ee79b9b411aacb1260e04b44fd33c2b240e62b183f6a3d5001d713205868bf0994f130a3552211fc5a201937a3e7e2cc7ac3316eb1182deee00308f6a206e35a82c95f90eb24f5ddaa0ef72f9f370dcc62b32687a213133ce5675c1412e6eee12fa2500e701ee4ba38abf2f8129bec106b7a31a5eb545330e60d4542533089e514c88204c5d4e93d63a67a9e02638d2b1611017b187a025a1b6e616208b1790520461173396b47c3c756309a998d5af90737d1d80b8e459c8a3e9d4effa6fce6942f45e1a4d7fe2cfcf3b9cf50056e3b5f9f26d68b3e26dff3f681cf8caf8319a681e83685b62e6f8a83b4d61f8894a5af207c7ed5b20b6ba01fd4af3c3eea848176b56ba548552e57e3938789bd66cea988c85d15c5126dd1edadd56a36ab74511816496f85ecbdd4a6d855553b0ba35ac5b9392cdca8934797e6ea9d6af4f801d7276d6437e12894f21659bcd8331b5b50c84450bc93c666b72f14d53c30b12574da7c656184adea953e35b4ecbb20282b97570afbb1b16ae8c977d7e20454692f945db8e3d884e65e1521b537e925f1abc9a2e351829836f927d4bb7f337de8b5e7b21812a00f1c81a57d14feba010d86bddac5d4536288f1f88134405644a00cafdf78fc13ecd01b5d96345b96655ef81490090d6f8252384b961e1d55b8ad23f4fa01831d5c2a48feadb54d04c944f07649fa2444d26521eff95cbc43879e087613f386a3c781f3785ba1cdd248c1f3acf3e33551286649b231e9a3728abfabfa40922c2ed13d988c999978bd2113283787a80ac585a53e1c178f51849a423cf75da58fd12ec415cd511fbd6183a16e5c0cd54dc79df70a62a782cc4221851514d9ff1bdef4b6a20c2c58a7fe7197409d19e692b196850dc596ae63e6501158cefc791ce81be174206d6fcaae8f27aa8e4575d6c2c897ff44c72898827bff514cb4d7e92f3c973e18c71bc94b96210f3d89d52b5f85667895c853f3efe9a36d853df9aa8e9c0e7bea1b1d1050c1cee1a29b23dc3d09fa156db0c6be30bb2dd10cea64f24ac328dcd64df99b486bd9be9f0d7413ed38ca8bbb076f2e52350f5663bfa531f80c38a5cc8986b7a55acf6fd081a249132e062f4268029eb4667817e541cbe1625e2c1009024747eed229e682858eb90c12c7cf6819391c8253a2fb5ebd3dd67a50096a142b9023f723baceabdd0fb0eb814ea8c4f9800a31e2fa66c9f1553a7c2f818a91fc54e99afbaa4d622aaf0179a0e264776652f41c4f99bd89fc9fc350863d5d531ac1ba173115da81ebc911b02fa3c85ebdd864b2b0564f17e27d66ff67caae4901af6bb3edccc7a59d616bbf85e3c642fe035c7a611b0b8ba2eb59d94a2aa4ae5aa50f2408054ab49029ab5be984d7f3c1fd2164c9e1534f5b7f0c5123581f3722e8bfe43256e783f04bf78a81bc50a191cd3d192121b160a720242309ba7008cff6292f6fbbcd31298408a480fe2126f0c9ed0c55576f3f598db635e34953b576c3a8f4136e9ca7fe5f2b63b48667b6272f9d008c061ed094189c15365bc67d1d564de5c754194548e172a8df81f96360e7e3bb952c20d29f53a3787d84b6f466c76252f3e6975abd36b662e26933cc7b9fd7744aa7a49e0456cdd2b7496efe10df00253f77d13521f7655905c45964e27c4644696e1d28377b9a40744561197e6b49e8641eb25bfd3044f4e6622d55dbcdf18d38f2e1a194a940606637efe2ab95f1de01a1a8156245ace05e47f03b5cce9b6f4550c4373dbd11b73d5da535538caba08c646f98b53241c4e9129ce66fbb6b2be39393ac5bd96b2421bfd527cd5b18d34a306f3b35c27fb9897250386cc3e602d2cd40fb2ad40294a2fce83c44011aaecb370a0a6335bab03008b7047c34f45411e46b771ce099ee9c816cb5afc26808ea3a951c44a7f5c4dfc216cdec4bb882f52db7c8ea8ae97ee1854e72ea188d3e7af50cb274e876d17eacd72f07057bc8cb0bcbe9169e99049ef2724603c37eb99e312a3a2cbd52d09a86a188273d6163c82ac68e630861c5627fd87505067369ff2819ea37e8672b9f2d1a6aa978ad3ce2cae8b3b127ac747670f419bab558ed3786650c509622f142cabf5645afb24167bf3ba4b53596232dbbab1b0d06e5dc851fe2b0004f6d415af5ac531dc84f5c06db7c52161c21b98f976b9e85cb7f48f8ab39311db788f107e7f2d32b19c579ee45bc02268f9bb9e43e10baed7bf7fe182d81e124c62ffc197af0ba296575d4801e8665796f96de184f4fd9ed2c1936ab09785bb3046b1baaed32fe82ecdb892aabab3c3c78cb0f8f5fcad6c4057b184eb25ee15ce32f6a7d02bc3f3cd714e295ea3466303b1e6a2ad2524de2aff98f3757b3ba3831f25d9b06a89965a0d40abfad01be52b8d2893c60f3beee752328b7e1601f7fe5b141475bd3395cf8b20896200aa94deb50d4a0462181220bcb91137a15a5fa779a8eedaa4d7fa98229a384ec2469631e78ea3ab1c8c03555c4f1b938f46d9c2a8eabf777208d87434b4f4a92481a2baa9fe196cc1f1ace57a0a37ac93779826b01181baced376c7758a84bda5cddea5e17ff38f7daae692ce7d72b966b2e47c37fea01d4697d7978db3d4edc64bf9e367d6d49beb05446c515f248efb73b97cb248ff0a525bf955857fcca4eb5c4352e288ccb7014f0599bb025c989e6d10ebc225471ef8827aaba185de59fbd89b55f87d267654f00404775d0299fe4979beafb4e62d1d6de82d6f41b73a2dec09ad2208edef7bc585bcda9ce4554c95666588da25b433ed00a96f818567fba5a9a596492c685decd51ea373d0d92d27f81b4ccdf81776528869dd496acdf632c44837c29815ff04143284bc7e4bf264126c5ff1360dc39e00d96c98d1c8fc767660deff11bcffc2583fabd4a77548c8ff282c62f0ea126b8936b84936e538ce8913eef87991fb697fcc564903ea0e6ad641d4f6ac9e84e104e2b7e5f96573b2053edf69d95acff66745f55505d218c64fefb77d862f611de1c86211cddc541dd47c974a4176c43bb7b04a140a8038fc37bce2f3074ce43301a2f15ae6b858c0d60aa760682929a759392a8207b6770d24fe55ba15d582f7865b62c05eea0056df722c9039db2abc40a9c0daf14ec0e91c4f5fdcb7c01f64f453756d469e09105cf31581d02162a02d585bf36dab551074db9b3e19582c50b9476dccd17320902baa01ee7a1d3c547c8702d1bee5089ab6e36d1172039f955f227230b64f67d7909f95f3b74549b186520cf717e8c9f474d174f275cef09592e4603436a71fdda6b53676665202248c46f0c980d840977503bcdcd31d69f602a2678e98c530a49cbdcf77a1c82b88376031d37989ab4d74ae299ee04b63a86b9cfae9ff2954bb80f9edd0e947210d025cd399be6053ec43858d1905104a3a032d3bced1af4d16a2193bd58385f6cbc6cf1f63134d6b3d3d0e09477dafc0013fe6edff6fce0170f08cd4295600dbc664d8bb864f5a5db9d392bb2c9b8b362312c5298d7fddaa033cffd82c94b91024fdaf55d205e50b19fb1e195c9fc8a4dc4bcfdd394c6883f1666c59c2b46e48305531a46f66d0bd994fda5ee81b988b2482ecc9ba0becd11247d9ec5b01eec9255239be568502e4cd3c187abaa8ea33495af5d4915f128e739a0b1aa15ad2bac6b33657300e64cf18f8f2832e8ddda58a8e698f5a97770b04dfadc554f1d2227d28875ee5da8a294311fbae068465672b61a3f9039b76ff22ad52ad3a5be00ebbe81670a15e47f254e3ad5bdebbfcb3aa44bba50a7ef62fdd00327d07aa017ac90659763eb9df1a2457760fe8740867faae7eb519c986ff707c1d77e2a24da62747343cf2d288955160a8095b59b71dbc8fc6ea8962a37732366addfca25fc7eed35cd9330db7d9e2bf1ef3e07979ec11c6ef093c8a5ea6e224a37f8286c970fd167551e5efc376a7efbb276e973765cf8cb8f1035a67269c0c7b6a97c44655cbcd43c6bb09cbd5ee62a6b5a41c2053bd78c8a605f48e1241c151994adb0a8a61a2b6e8413cb423024f364934fa8622740d210329a42ef5fac2fae1fe4cca322112903b4e40a011c2e74dbe3858906881a09bb715344161b9e2a6ef664ccd16ed7e6e9b10ec656a74f3224523094c75a1a0484ba7497e2498091a23c230be2140f1348526e2bf8da5e0bc0e502414f77d6c6de80e03ea84b6e227eeb1b09f909e5be0512ea274d4731fa5bc582e05f611c3411d3b1c2643154a4e79f3a37ac52019625fa8eab690bab7c383e20ded9aca1b0e2babe35ace7bfcfbf476656f45b3e1e6521d89f69be3f02deafd3146cbafe40374c0b3f0346634c4e57d6f73fdc9a7483e415db721f92fc7a70523fa696791f7d14698b4cf11ed3ad34a5d2c45506dce9aacea00a80e60daae391380e7d6307fef34aac0a68a6fa8f8fea242b778a5b2906af961c844d521e3fc96d7eeb50edb4b463a11b2589bd4a9bf2721b6babb5ef23d18190f9ed25d6197507f1771e25200fa237bd8047f0ec4a0f5c41229d7f879590b19971d8b8d48b19fd549afaa818f1c9deec36d53a610002247911f04cb52c2992d2d95b2912d721618cbf24154e4eca4a19781c6cde017383d", 0x1000, 0x1}, {&(0x7f0000001b00)="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", 0x1000, 0x8}], 0x13c1404, &(0x7f0000001880)={[{@nolazytime}, {@orlov}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@i_version}, {@jqfmt_vfsold}, {@abort}], [{@permit_directio}, {@fowner_gt={'fowner>', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '%\xc3$\xad/{%'}}, {@dont_appraise}, {@context={'context', 0x3d, 'root'}}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/packet\x00') r1 = syz_mount_image$nfs4(&(0x7f00000001c0), &(0x7f0000000240)='./file0/../file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="6e4683a233f68ec0e3aefa903f542f65242135885ef9b4d870c10a73ed2279eb8de7e7bc2aca66798d5a095adb136ae6cbe95c93979b8f7367bfd5312524a74542762aca97f8d3214d3376ca67f8b92e3656d738a8b46d75763ccc2444be4eacf988d20ff81cf7adcec4a81c676ae115a64d429f1d282374e57cffea083a1c8a5cabbf1fdbe6defb0475d971ad0448d4c0564d3f8088da47fc027469f20427f2600c4eb07d29ac1b82dd1c9569ed769e", 0xb0}, {&(0x7f0000000480)="f5f261210e918bb4cbedbef20effed9c359db7a47deff2bd4fded8791795f55850c27289e53b5476e3181ef0ce9d90d86c30311fbdfddce3ae0de7669d738621d7934670885dc42b559110c121fa9a75f6b08cd0bad124b920f38457955cbcd137bc6efe4ab272be22df6e9bc4d0a2654c0facd2071f826257d350d96fc897311be8934dee36bbd774eabc7eac077a424829a14f7dd15faa0abc70f3cc728f5b59578b790421bb0bc48cea833e422c", 0xaf, 0x4}], 0x800000, &(0x7f0000000600)={[{'ext2\x00'}, {'stripe'}, {'stripe'}, {'`\xfc\x91(X\xbe\x10\xd9\xa1\x8dq}\xa0\xbe\r\xdeS\x1c\x7f'}], [{@context={'context', 0x3d, 'root'}}, {@seclabel}, {@uid_gt={'uid>', 0xee01}}, {@subj_user={'subj_user', 0x3d, 'pipefs\x00'}}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, 'stripe'}}, {@obj_user}, {@audit}]}) renameat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:28 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x12) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7, @empty, 0x1}}, {{0xa, 0x4e21, 0x0, @local, 0x8}}}, 0x108) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') openat(r1, &(0x7f0000000000)='./file0\x00', 0x40, 0x100) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) getresgid(0x0, &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r3, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r4, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x1}, {}, {0x2, 0x0, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x1, r4}, {0x8, 0x2, 0xee01}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x1) getresuid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f00000003c0)='./file0/../file0\x00', 0x4, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000400)="2b71ccc34c31199c6f7f61e034059ab5ac3e58a56417022ceb4e8f9ede3d7e9eea7d5149706e14fa4fb62f7de8f20cd19b69417e7de24c3da3d0a5e9e7d7234d4fa1850f95ee4f3048fe1107c781142ce6c2e875ab72a0354875f99e2272c26ef598dc5f05dd1ea69b10139f6044a1dca8178bef930e9fbefa905cd646fa70cfa88dd37fa5b65dd1947af5490566205652baae7bcdd3b34bcb2c60e7439f80257e32d0820f66a00ebf70d83f3b44acc246c3cf", 0xb3, 0x81}, {&(0x7f00000004c0)="62e8d91b73df0f8a20d2335c05c9d51d681a5049723ac13ea3fa45c8e3dbee4e2791337b2e61", 0x26, 0x7}, {&(0x7f0000000500)="7cde9063ca51d7e259304f093de30735686d9e4811b7825b9489d8ed1674ed931566499092090d133fb804c0cb523518340213859b5909f03285a3e3354c064568485fbc43354968802b8fb8ee5a81bdde36eecf329d442c58bbbbcce9219e083feee80de85d85c517296c3f9cf376cb1a146392df338269c5536d9ba96195ce248942b1a5fd6c10e06e8b2443ab8fac0189843b4d", 0x95, 0x14493341}, {&(0x7f00000005c0)="2405af2e12440e42cdfa4d2f3eeae85a6ee390e6c4370c0c81c00a0e2381836e0ca5f3aa92a76bc90f8755864658b6c3a57559edea770c8b62c94821fc232fc455eac2f6a2c0f0cf7e6d3873f905a82bcc9003bb207bffdf47efdec00122086cdf8035c546ef18b79de543b4047dabe756d13440f48f17fb47b3893991667a086381ccc2aadedf259143fff3691f", 0x8e, 0x1ff}, {&(0x7f0000000680)="018c2a3c3659404a88", 0x9, 0xc70}], 0x2000, &(0x7f0000000800)={[{@huge_always}, {@huge_advise}, {@mode={'mode', 0x3d, 0x9}}, {@gid}, {@gid={'gid', 0x3d, r3}}, {}], [{@obj_type={'obj_type', 0x3d, '}q-^.!!}*#\x13\r('}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@uid_gt={'uid>', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fowner_gt={'fowner>', r5}}, {@smackfsroot={'smackfsroot', 0x3d, 'N\\{'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100c0, 0x10) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='stripe=0x00000Q0000000000,\x00']) 16:17:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0xa}]}) 16:17:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) unlink(&(0x7f0000000040)='./file0/../file0\x00') 16:17:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x95) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000040)='./file0/../file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xfffffffeffffffff}}]}) [ 2832.467549] nfs4: Unknown parameter 'ext2' [ 2832.473772] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:17:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x3f7, 0x900, 0xa7a0, 0x25dfdbfb, {0x10, 0x7, './file0/../file0', './file0'}, ["", "", "", "", "", ""]}, 0x30}}, 0x0) 16:17:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5505, 0x0) 16:17:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xa}) 16:17:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0xffffffff00000000}}]}) 16:17:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:17:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0x4, 0x100) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) rename(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00') [ 2832.584677] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:17:28 executing program 6: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x95) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0xb88462, &(0x7f00000003c0)=ANY=[@ANYRES64=r1]) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x3f7, 0x1, 0x70bd2c, 0x25dfdbfc, {0x10, 0x10, './file0/../file0', './file0/../file0'}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4000044) mount(&(0x7f00000016c0)=ANY=[@ANYBLOB="2e2fd8fe3b0f03d70d91fa3bfb09c2e1cbac5516bc54891d842c4f65aebe977b4fb4945324274ecc10ea5944ad6bcab8f15393e78b8229c38476cb01c1d1a3a7ea8eac41e223a499c5210f27924cdffd7bb5761109eceada4cfe1604940c9654cebcfe78d26f59b72ca2f106de63a2b72a483acaccb66b814767d33ccbd4874d0dfba321a67924a0235f5f04f9388c006347d9623d04899468c59b2642752c0a767db6f8844efa5bbdb7bd45d26948ba3a2caa7fa2140c8bb16f35a4f3cacc1efced2b9352e1396c6c85b087d32963ca65c3b8b566fec104d2d8a4e1ee7f88085987df631044285bb9ce2f0ac744cc2fd056183a1d"], &(0x7f0000001600)='./mnt\x00', &(0x7f0000001640)='udf\x00', 0x82000, &(0x7f0000001680)='\'\x00') openat2(r0, &(0x7f0000001540)='./file1\x00', &(0x7f0000001580)={0x20000, 0x8}, 0x18) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./mnt\x00', 0xfffffffffffffff9, 0x2, &(0x7f0000000080)=[{&(0x7f0000000400)="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", 0x1000, 0x85}, {&(0x7f0000001400)="9ed8f517afeeb79686e50e96fd31874804984bdb8812390558f86bd5dc72241f650517666fd6cd710b265999c80b7ae8a55d658fb890067d1aff0e2aa36b649548da5db0a8be4db3a295057b9d631d7da209e8094802af68fbe7bf582481b27a297b58a1c842275783bf79dd0fa55d643ded959a10d27cc2908d90ad5ef27828ac0c63514579b8a6f73f15d2852be5c706d187b5f05b8f6958dc87a96232bbe08342c6559a4f47e4aeae73fce7ae0a9bf7155e0b90edf0e458c351888a2cc7c9", 0xc0, 0x6}], 0x2400, &(0x7f0000000280)={[{@uni_xlateno}, {@fat=@discard}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@numtail}, {@shortname_win95}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, '\'@'}}, {@smackfsroot={'smackfsroot', 0x3d, ',:{(('}}, {@subj_user}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f00000014c0), &(0x7f0000001500), 0x2, 0x0) [ 2832.605653] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2832.624498] EXT4-fs (sda): Unrecognized mount option " [ 2832.624498] " or missing value [ 2832.644080] EXT4-fs (sda): Unrecognized mount option " [ 2832.644080] " or missing value [ 2832.650601] EXT4-fs (sda): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value 16:17:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x100000001, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="08135c345f103b0cdb9660475758864a34029b3ccf405520ae1bca3ebd243559f1b05aea16e5a24ea2777d55d5661df9edcfad0579ac9a602bce3db0047e515d7f800cdf8f198edad83cf4cce0e511f827cd5d07c61db5e3d738a5eb4d3653d254af78", 0x63, 0x8}, {&(0x7f00000003c0)="225f77d4816c73eae7f9535c8bce6d05ce6cb378007958ecb725411b9ec2ec1d4dad7164e599647f8fb0129d5869701b3f0a8929f09cbe57bb55c5efc66254e0b9f21f947bfc17e1a5e0a68d407fe6f2f4476d98efbe08892006f6a489f5d8dd315e099b7b29a7712ad62d484c4ed7d90750429701b0ddb5250bbe69c99f016de19344f29db987dd9ccbaee887643a2c4d6ea2f23f6a7f35172769b6b5a1f69e4461158eeb5431622a7be61dc522f6af7c978ce8c26f77d5416346ff7acb8b6f2c1629988fe520861c2c0ba3dbbac5bc3a7b4a4c1e6e6332e6c617a36ac4748db6c76f2de3f56f85f17829218b75f46ac6709c03c1ef4a1b", 0xf8, 0x6}], 0x83018, &(0x7f00000001c0)={[{@init_itable}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:28 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/97, 0x61}, {&(0x7f0000000240)=""/170, 0xaa}, {&(0x7f00000000c0)=""/48, 0x30}], 0x3) syz_mount_image$ext4(&(0x7f0000000300)='ext3\x00', &(0x7f0000000000)='./file0/../file0/file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getresgid(0x0, &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r2, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r3, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x1}, {}, {0x2, 0x0, r1}], {0x4, 0x1}, [{0x8, 0x4, r2}, {0x8, 0x1, r3}, {0x8, 0x2, 0xee01}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000016c0)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000001740)=""/2, 0x2}, {&(0x7f0000001780)=""/132, 0x84}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000001840)=""/91, 0x5b}], 0x4, &(0x7f0000001900)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x10002) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000340)='./file0/../file0\x00', 0x7ff, 0x4, &(0x7f0000001640)=[{&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000001380)="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", 0xfa, 0x7}, {&(0x7f0000001480)="d1c0f35e6445fd721dcf977c69b8c7308580c659c7dd1d9280503cb06864b4d49c6f148662fe82079a0107e0ebfea16e6ce2f2fbd503f52f075a0eca2fd2fee851f0f60ded346c43c3c72bc71682b496334fd6e63ae8518db9a9da434bffe3221326af856054b4c4ec6a636028e3afff54fe3123bd44b5e192226a73896dc9a8a44e04ab0b7abb3ac4b0fd6f4c13d741349573ccbf7b4ae03452d5409faa69e9b32e9cdc953fd3b319", 0xa9, 0x5}, {&(0x7f0000001540)="cb87aba16075778e2dea62987da17665d26015ac934a8de25c20d5f91c901ee3892b55e532a187c497ee81d2eec867b3fa4c0a25cc63a84e9507f6283d65947cf5d4db01aa59f2404dd0d0e5d4dbcda40d4a6884c35f83edef8835614569e67af2c9ff92400e5a17d9e813b9189ffc4e95d221476485ef35d4e1ade1574beeafb2a01bb068f096f756d7f7066e2f3b065b99cf0a20e023b50d2fc9fa2667bb95174d814315903c8a1ea5ceff3311c6b212e0d773dd0e133670aba01a1a6e26a62e8d5abe67bcf1d7eaf5eb064fc79f54fbc72a7a601f9c68f64d68ed3071693069c5", 0xe2, 0x2c0}], 0x800402, &(0x7f0000002b00)={[{@huge_advise}, {@gid={'gid', 0x3d, r2}}, {@size={'size', 0x3d, [0x74, 0x25, 0x78, 0x38, 0x6b, 0x35, 0x70]}}, {@mode={'mode', 0x3d, 0xffffffff}}, {@huge_within_size}, {@nr_inodes={'nr_inodes', 0x3d, [0x0, 0x36, 0x3a, 0x6d, 0x36]}}, {@uid={'uid', 0x3d, r4}}, {@gid}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2f, 0x37, 0x38, 0x36, 0x1d, 0x2f, 0x35, 0x2c, 0x2c]}}}}], [{@pcr={'pcr', 0x3d, 0x40}}, {@uid_eq}, {@appraise}]}) dup(r0) 16:17:28 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, 0x0) 16:17:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0xb}) 16:17:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0xa}]}) 16:17:28 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) [ 2847.733418] EXT4-fs: 10 callbacks suppressed [ 2847.733428] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2847.743642] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2847.754554] 9pnet: Insufficient options for proto=fd 16:17:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x60ff, 0x0) 16:17:43 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x20406, 0x0, 0x0, 0x339069, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) umount2(&(0x7f0000000040)='./file0/../file0\x00', 0xb) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x388460, &(0x7f0000000180)={[{@stripe}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ext2\x00\xe3\xa5\x1a\xbe\x9ahH\'\x90J\x15\x14\xc6\x06\x9c\xe8\xfc\xa5\xeec\xa7\xa9\t@\\KNs\xc5E\x9e\t_\xbbw\xa2\xd5\f\xd6B'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) mount$bind(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='./file0/../file0\x00', &(0x7f0000000640), 0x40, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0xde) syz_io_uring_setup(0x2bad, &(0x7f00000000c0)={0x0, 0xa643, 0x0, 0x2, 0x274}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) syz_io_uring_setup(0x13e1, &(0x7f00000003c0)={0x0, 0x8e6c, 0x1, 0x0, 0x1b}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000440)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x64}, 0x6) stat(&(0x7f00000001c0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getresgid(0x0, &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r4, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001200)={{0x1, 0xee00, r5, 0x0, 0x0, 0x24, 0x2}, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffdd}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x1}, {}, {0x2, 0x0, r3}], {0x4, 0x1}, [{0x8, 0x4, r4}, {0x8, 0x1, r5}, {0x8, 0x2, 0xee01}], {0x10, 0x2}, {0x20, 0x2}}, 0x54, 0x0) mount$9p_virtio(&(0x7f0000000480), &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500), 0x1002, &(0x7f0000000540)={'trans=virtio,', {[{@cachetag={'cachetag', 0x3d, '\x00'}}, {@noextend}, {@access_any}, {@dfltgid={'dfltgid', 0x3d, r4}}], [{@dont_hash}]}}) 16:17:43 executing program 6: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, r0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x50, r1, 0x2bc04000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) 16:17:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x22}]}) 16:17:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c005a585b8bc567fa09f601f032838c559d17c84febd0e9ed4e407a6fe361244df21e1b469ce1bda6313895c670a54ba6543b33afcf6ee823dc3386244e6e94f437085d7a2e597a5652711a0828b5e912e0292a81a8a3cd2f5838505c0db2f57c0dc4513cb23dc35bec6f5e854005cc6811e666a0966f046e71cd4cfe4e238c62b676198df83e95e8bfe4e6f9a450d8f464b50cd6"]) 16:17:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:17:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x10}) 16:17:43 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10001, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@measure}]}}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x23800, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c0059c56d58f340127bfc24c6469aed2eb6316df5110f9814665e8754c1cded3bcf685405c05b046d50f899ad0dbd0000000000000000cc91717937372e2aab2d11810787e827f98d2ebda8"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f00000005c0)={{r2}, r3, 0xe, @unused=[0x6, 0x1, 0x101, 0x3], @name="ab113e965a7939175631ddd9c0187137c43fb2d96d95003ea03b7c9fd22ea91812ea78f7e3767594b6422b128d2a5d89d4f5e3cb082c8fe998934d28f554d700357bebf4141c6ff8a6850bb75a79b1b45a8000319d3164209916cff489cd768d23c2519bc776239a61aa4990a0e9f1dc6e7e9739b53be6776dd4c8717a7621046f2369a2c3f3b76ccc7d7f7ffac1ba7df0b889d0868859cc8f6b2853dd145e28a016c5d2d2a35f2c1a290432843c853308b1edfc9bcb065ccab3816eacc6e85ad6580ba88dc1fde470d246e1803fd87d6106e78a36a765fac4009198ca1bbebc80173b0d93b40d4aaaaebb274846dac776baef40f7a74a5da4c407110ff11c21f6be28e695ec54cde55753c6538a1e47c3009d3cac5d7afecc402d98dc081b6a974f073070615b1fe32054277de47cdda1755ea8ee3abb962012004829e9311774170f9f154b3fdc4149f0b6a6bf2612bc3c7f084dca295fe48b06a632b6d56285225adb2b4ee4e34bfcbcc8e55f546fbe9d6ef3f109f36c2fdbcf0f11e97d4bec001aa9f5451e0c7ba1cf108cf40731d8beefd90cbab70c2aaaa66c2c4e36843125cc3f68d7151ba31c0ca7cefd78061bf14d07defe120c45611ab1b821dff828485e94168ddf3be55980ea711daa679b1c04b44bd87f26a40db511276a8a11d3474eab034585901130222b408ba90001dea39d2d2d3b6e8917633826348d271dfd219d55bdb146992b514177515f5992e89e7c2958bd212099d569bee0e0d6621c2540645269fbaa130a5828f6c7538b718b28f2294f80bb579083f16eb382ad0f002f67f4c0dcfde7df3b0224a4d2d38cdbd9abe7f2ac65691a325467e5d123fbd3d98286e17f91c165c7bea4ed99a237fbc7702b8d841fc79b8ff78f78665937945269679ea9ae5bee5d396f735241d0cc22d6852eb6a0c9cac46563f53cacc4b204f67bb25e91356100e5dd03900531566a70cdf7af3273109574448a9cc96c8d147d019873b68ff2ba9ba9fd4e76bf8113cffc044d0fadcbfa6192211a8b05bec7a702444ba4238cafd3e2e87aca5c17d4335c1215fc3983ff409fb34917c6b176408d5955978d4ae774ac6795d90bfabc695c197cf91b99fd0860ac36b29e902b3e263d2ef3677b56a9975e42dd4aa65be8ca4c2efc3cacd473e7b2486ac77f1fdd0073f92e767fd9cacb362a3d9d4ff7d6b25164a104f8ee2d1f459a90fb7271c5ffb4d704b92f6ebc73afa9d2c1377f36fd85aebfbf5941cfd90e84e9a9686c29cc4b70a473ef1973746c1adcb7e0828c24febebbafa418476b86e86a5070e16e16617000917f70838b75b2792bccffce1fda96e998db94b6bb4088b25f0d81b854b143acef3cf6f4c8b4493937607f1e706dc84f869e04a318f5ea4f91697759ee0980eedfbd57ef69c3fad97adecb815f0f6ff54a8fb8fe096719a0969c80ab4978b53108e151fcb9a5ce3b65cd8f7452999fb6b13f030954a490de379f11494897fed57a060b1ab3c84852b752dc03bd4ce13ca879a3c033a931892bf6aaa16e5b5e5e1f68ec5f1de7b4260e64ad4c196efd1192aea50d57f354275e3ba4b488f8eb90f2456f408d79d8822f789bca8320d471da23ed4f9d4a12c6f7029cd2a0f92fc2c9178238972d9af674d25b95784c06c835f7e08727f71a29dce747774d01fba59aeba73ceb3e5a7446291bc860c3c7d91bc3d3d8695c99ae4c044f86b09e6c574e5f9a38a454e2c0ae277dad45d8d00a487e33856d2f0d80cd8ac9e6bc1a1c243ee4d873176b36ba1bb340fc87a5aa49b9a322bbe5a670be8c7ed44634bda0a5574a7596029a6c4bf7000c4da3f9aa29429d559587566e3bc9794b900dc6502ea86cdaac06a31b4f5f4b6f0e4e95a7aba075689e3ccd534d117ff9df4809f105c9584c85a9ae738ea0002906b3835798e11ea88c1367ff7ad784a53ba66e068a5c79235275edcd5f221aa400ce04f20729f04ecfecc32c76135ab7c207b1143bec30cc85ade0275d6d53eb661fcef56c6e9d8b69eadf98627693b05b09717a7d470ec2acbe5134b778d4bef9c9b2a2ff9d8918c68285cf56e6b7ee1b7d38c78009897f4788132f5be5cb3b4c0c5f5d2bb1902e7446293d8c281a5049f8b57d44f961f1a8f2870bc5615017eee47ad5cbc8562b44faffd5862afd21565ef8a63bc82927ae30981f9c8a8b4df421caa73881eb0130d68a4dcb5878b960fee6a5996538921e49d08fa69c4898bcfed516d7ccac10f2a1f1f2acb9d7a45d17ce848669f864d16237a6cd2bdc0159eeb8ff3b95825756ecc24e092a20ac737f69b45f79321b6232e2a2644867f9f7d54524b8c95f8278f605cb04fe3364ec98cdda6c0d350b01983415e3c9ef5e750fe9edbcb48ff1002ede69535317f459c17d2c14d45bfda9519f05a6c723e0c9ca06830d2ced1b199f127992f21d8846f2b44295450dc9a5405b08fecf8281723c51a9a1a4f7d91d919bd9275d829edb453c21274334c8c5a1e11fb25f84b0c895ff7eb33cdae9199f0cb0e7ada8c764efdf2070b66f93168254741cb046c6821925d2c1fe9c02910bca466ba0da12fd928d22f6971b23a685b94bfbf2d626fe39cff1ee1899beff4d57515d30662e54d61bf954bba520275ed7ab0e60f9d42c03c1183d2a8cb34a77d2f5324c002235168e5d56860b1859f0580e450a366e4f6c2992f6fccec8a3b8a11e6cde94f807bd2573cd25a40b891b12542b4f6e41b28240797ae175d347ceeb822662c3cfa77e00efb61501159aafa16c0a537d1da8dc18150e337de81010501add2b6c5e8638d191df86503f90076c719bac961e574be4bb6b8593ddb6696cd21b5986448923508d96d2707c86fdb9f8467a48e8bdaa3ba88fc5ce9db3a5394396460fe0b93a107cc5c1fe86a76ad3c328bc6ba2911692debef9cf36159c52aa5bd39f6143bae1a5db4b7ee38ba43a262c37dc261f5cf0b8d486c68f6acfc3457316431f1fb4b713eb4f0a41b086591db2ad485412cface6c2aae6e91a27335ed60b82503224a9fde167523ae4e2976e80be9af54300bec7de41883cefe33e2466bec4976d3612c3f72f8fed12734848bab47650f6ddd4fc407a3596ac7a0ebf0d02f4cc598106c6e2734647357f75b9ad02631cbd5f7d3b84386c57015cfdab962b00f09c1190778e414fdf1af3b3b56244256334cc5c8a5b3f09c83695d37170cf1183b6242550c9a1919475eb7e509b0bb7fc5472110d4226c371ab65670d4c5d6fa1aa3ad74f7cebc277ef52abe00ab926d9aac0be1da9b3dd1826b9e465b54644b29445582724cbc3747671a45079dd55119e94648249d2249b75277d6183aed5b86b5b7e18fb084f8c314bef75a4f8c60cb51f326a4fc53823e1bc3741cb5b75ac44f2ef1c9d313efd6c6e9b500f1dd1046a58f76afb7e6ae345af28020f5ad19887d023b45ff9652ec1a82e3a173ce5c3d13c2800db91ed8f3b6ac5a57920e2cb2611d728b8e59a5cf584261c1f06d720cf1b9a44f16f2690bf0874a805ae2599334cbcd3c19051c5485a6b43b6cd9a4f5dc6a387745d09f298bb111f94f63c2c2159402aafff4a93e449eafec1de10c306f79da0313e74d863606da5b25edb5f7a5462c822433b5d204dd27260c97a177ec250e583fad3d387406c880b7618ad117c529ea4f9f26e1f932b7f124c649bfe7901c4adb7a97adee343c0aa0022de35ee21fa54ba4fab992f1fc3dccc979363a6030eddcaa602316b8f85bbb4d88047c69cf82b4e4be08eb57f60fd37fe06c2d6d1ad166c68539abe19f624ae7f14be4bfed2b57962f58780d5543aec80f0f57889f73b2589cffd85eea2505a5c057888501350e5d39d1694877853c174f59ad2f899d39fcfb48429e3fd28a2570a4578187bab43aa0b725677f4679fa36999f1139b1549cc41a9867ed1017b6407866f8a9bb6044b1c66e003cbd30a473309f55680a5e496f70df208f801b5ab6a450cbd80137786aa57d9191ba8167a98bef890e7018f9a3dba1ef9699d60ba17290e3adf27d3daedc63bf5cfcd31da4c796e07aeddaec12804f3049b4e23d01bc023c9ca653e4c1f665c33decc62fc765146fb6321182cfa10003c6b204c6e41ce3af680f99f419555dc4b993ee28e834105e445ab0966719a721a35a642ea924c1afdf579dae1dfc43f0f92d479c01da922ce48a5da15d71d05e1590210a4ec4b739084ff8ab1bb1becfa939a16671224aaf2a0d88909b45a4dd553d3c96db8e889ef95cb119d3b231f79f21af9a6c1623ce313f91526f0ba9a59874f38382b3abca572957a788eead8c0950ee73e3643ae70652da39386862b867debb6d56d45e01e0f6640418b7c340f28ffd8d67a85df50afef3a0745b2cc811fcacdafade57bcc51775354e2972561af3637b017decd96af3d30c572a9d85a89c6095dfca6b999b6ae2841a672eef1c67a5fe7d6125dc4fb09d917af80d401e63ca7c177cbb40f1ea75d764d47e3729c359b64ec031e207a7acc73c9d5c2655710578f9fff93a4893e9e778604c5f22d820adde80b4ddeaaac2355bfc20700b992f758f50bcb1d2302f485ae063cc8be2599a307934f816e4fa68de326aa71b6487396aed9c0a31eee23699769daadd28ad1cf2f8eb9370501336537fa3c169da1990e650c600e998d5c0bae708fee9473d0292da4c3b3e1981e497513d87a11f06becb6be93c1c04b0041aa1a0ea4d93e60ab6f403d7af1ae35f5c5b4603137ca56e21bf39e5bfcf39945799c29c1e8bf6e37499ff816e19b4494fd6915f7632a9b3f378768694cb3884c2c53ada32d940d3d67f1fd3a3e9b441f4f987ae6f37c25ca2ce2d0ded8738f846f889af0aafcb740806f5b9b10ad419a306b404c10fdefb38dfb3efe474d55ba3a04cb913288eaa3080d0642813700c77c7a0961415152259e0cd51744e9f842bb1bf6e6cc1b8f6daa3c072f3f3b2fee96ae43a8e90a94da72428acf7a0e913be3c07243b098d6f6d7b4be054e285595030a840f531474641c4a8caeb0e0e3132a7609cfea1762b6b888daa8b373a23428b351e8f1a417bc74a03548b36b49da64620e6c1527577e1061b1339a4954b49bf7f06177a2ab1993f92fd345034b7118e52e534b3171174557d6b2551119890014f5b01021f79a7105446bab5c13d27ed52aaa064b69d182e5f8ce96f0470ed258d92a8fe36a7b82480f0ca07eddd09c83a8a3e5cc52a0500c337fcd127bd4373b0ab9bb78ac6525fb3bad136301243156cdf08247ae06925a91ed3b7813c764125f55583be6e64ac1a6bdf0a979a6396a6bd0dca1382837fbd0d0201e00a8c2901ddc2374dc06395e4c26d69cb17c367921dfdd856e81de9063044a47815a11a525c953082875f56b584744eda0dc9ac9fcb1925ef25c706a29375ad435a2d63276c262e26f58c283a5fdaba7f9513b657c0f0e8a471f50c421a3975af92d000ed3c5b488be0557d104d022beb3ec1e76a5c3eb4972dba84d3035d57968836b55fbcbf5e540d623a566703fb11dc8fa8f028a24e14a243e35b92603caa689e657503b9a71371f9016a7b81a9631f129e1fcb369f08fd9bbc0c301bbd573a385fcb4e06d3caf6e94ee672f726758f47160fdf27929aff5041e121d4857f8ff8e464e311b1e87e68efac3dea1c3c53f1b12b58ce965794dd847fbe55935c9c83fb3515f4c016b650b07d9a843"}) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mknod(&(0x7f0000000340)='./file0\x00', 0x40, 0x7f) close_range(r2, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000240)=""/140, 0x8c, 0xf6) [ 2847.763714] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2847.765760] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value 16:17:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6400, 0x0) [ 2847.776324] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2847.777537] EXT4-fs (sda): Unrecognized mount option "stripe=0x0000000000000000"" or missing value [ 2847.783491] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2847.784928] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2847.789515] 9pnet: Insufficient options for proto=fd [ 2847.791600] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2847.799454] EXT4-fs (sda): Unrecognized mount option "stripe=0x000000000"000000" or missing value 16:17:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x5b}]}) 16:17:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000240)={[{@minixdf}], [{@dont_measure}, {@dont_appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x30, 0x65, 0x32, 0x36, 0x66, 0x39, 0x63], 0x2d, [0x5a, 0x36, 0x62, 0x61], 0x2d, [0x31, 0x38, 0x64, 0x31], 0x2d, [0x0, 0xe5ef150028253aed, 0x32, 0x50], 0x2d, [0x34, 0x61, 0x62, 0x65, 0x30, 0x31, 0x33, 0x36]}}}, {@uid_gt={'uid>', r0}}, {@audit}, {@permit_directio}, {@uid_eq={'uid', 0x3d, r0}}]}) 16:17:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x2e}]}) 16:17:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x18}) 16:17:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)={[{@noblock_validity}]}) 16:17:43 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000003c0)={@mcast2, r0}, 0x14) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7, @empty, 0x1}}, {{0xa, 0x4e21, 0x0, @local, 0x8}}}, 0x108) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(r2, &(0x7f0000000140)='./file0\x00', 0x95) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000003c0)={@mcast2, r3}, 0x14) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3, @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRESDEC=r3]) 16:17:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x37}]}) 16:17:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7e00, 0x0) 16:17:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_io_uring_setup(0x4d4c, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x6, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0x8}}, 0x9063) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f00000003c0)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c004c16c8e439b927fb6efd9ee48ad5027a1d42b06387c35bcfb18572fe8d3681f47d2562cf6490b5e09c24c273b2e5f97dceb1442e0122e0fee3ba961e7a51470aa0482a8a0ccc7dfec961edff71cf3a1eaf42c744a8dcbc6eed3b17afbb75c46a56a1d344e01f4880b4ce63bae729881f1f32bb2f98edb65c49c7e422794c1077170b9d136dbba1e00daeee0c50867d6b2953c5af8cdae604fc31efab6363204003f1225e364161b93cf86dc24c68de21232bc5073010dd8e40a0b1fc3ea220ecc31c971fbaf60e0e9a9601fdc3bb014351f38ed72980f5ba962ec0d0eaf93bccd6b86501961b8df063822a7a935f32a2ad610fa1428335bbb2fd15401895aee5bcd52f5b69b05f11cc9f69518c815d9e87416abc76e9f6093bf7fcbdc7ba"]) 16:17:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="051a08104012ddba5d089bba54d110d8e42504eedfb2048cb6bea0b44b315f2d7c6fba2d9d8a3694f8b1cd31ca4dc523abbf558159f572c33ec08bd1e152ea769b7e87dbae5cdf2861762a9cebb22f165105b52a0a1853679dec0a22f0e375114e58ea2f0a1f8ef54846a24b2be31080573a70089ab80bb9f80fdffe711b2a94a0c271daf2b9cfd523094d65766f37867817735de1b5d4f080b40fd71a891c43c0331461df1ef0c3f15194acd9", 0xad, 0x7bef}, {&(0x7f00000003c0)="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", 0xfc, 0x6}, {&(0x7f0000000080)="cd3eb7fad7d5b8543e1c451df8bc649b711b3b4bfe2c50005e3a7c04dd7a1ef2eed6c21d86bcd40ffafe607c2bfc6215036fbacbe773fe7b99019cfb5e425af270f8335117864627ccfbaeae291704", 0x4f, 0x4}], 0x2220002, &(0x7f00000004c0)={[{@nonumtail}, {@iocharset={'iocharset', 0x3d, 'utf8'}}, {@iocharset={'iocharset', 0x3d, 'euc-jp'}}, {@iocharset={'iocharset', 0x3d, 'cp866'}}], [{@pcr={'pcr', 0x3d, 0x1a}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r0}}]}) 16:17:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) openat(r0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x124) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2e}) [ 2862.462986] EXT4-fs: 12 callbacks suppressed [ 2862.463011] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.466844] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.471114] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.473357] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.475863] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2862.481317] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.488017] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.491261] EXT4-fs (sda): re-mounted. Opts: stripe=0x00000000000000007,errors=continue [ 2862.494448] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2862.497415] EXT4-fs (sda): Unrecognized mount option "." or missing value 16:17:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, 0x0) 16:17:58 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x2}) 16:17:58 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x37}) 16:17:58 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000040)={[{@test_dummy_encryption}]}) r1 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0xa8a, 0x0, 0x0, 0x6c810, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000200)={0x6, {{0xa, 0x4e24, 0x7, @empty, 0x1}}, {{0xa, 0x4e21, 0x0, @local, 0x8}}}, 0x108) r2 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x101800, 0xe1) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x500, 0x0) fcntl$dupfd(r3, 0x0, r2) close_range(r1, r2, 0x0) 16:17:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:58 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374726970653d9b28303030303030303030303030303030302c00"]) 16:17:58 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0/../file0\x00', 0x111) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:17:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe, 0x5b}]}) 16:17:58 executing program 1: sync() r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x22002, 0x164) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8cc00, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000680)='./file0/../file0\x00', 0x95) openat(r0, &(0x7f0000000600)='./file0/../file0\x00', 0x480400, 0x11) mount$bind(&(0x7f0000000540)='./file0/../file0\x00', &(0x7f0000000580)='./file0/../file0\x00', &(0x7f00000005c0), 0xf440bd6b16305ea, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7364726970653d30783030303030303020ff0e00000000002b7c00"]) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x4, &(0x7f0000000180)=[{&(0x7f0000000080)="30a31c590830cfbe75e34470ed988efea1a2a343bfaa7cbb0bc036af74d890fed08ab957a6f120471293a02261be67aaa46d8ad328cbc61d5ad4f14f7c7c39e8e2f1142f5e7682f3bb331f67923e09426f56c938aba01a78342e0c478bbc4d36e02ace94ead363d89af342de4c4dbf631de3db", 0x73, 0xc5}, {&(0x7f0000000240)="775f8a8f7c3cee9231c38abb7e92360282686eca64b93c07adfa94aebfe49e8db8ad320324003f1d5460952d0e2580e9f88ced392e9c67c08404d0249b9645a0745c1b840edd56ed4d89082cf8f67ae8dc1714c7c0413fa07ad7181199cb55db4e201cc563ba7bf4572fb8f4f17af76065306e2cf4d279ad8629fcc2c072f702c25e961ae2b6bd6f5d6dcfeaa88e538c43c22d44cde2cfbd43c066650b0f708d950f385c54974dbff16b2435bf5557f7db9594aa2a32", 0xb6, 0x1}, {&(0x7f00000003c0)="3d5c6ee63c1246ad4e34fe04cf0c33119d213da1d15514a83c4369e37dccb777b002c21f80f3a922840e564e565168667f8b51fd1c962864d82015f15af643953d91bf26fb568379288d431dbede3c239daa35d7db74200a81d069489b2bc51d296b9805204e3a7fb2c18832f56b028e1f6dd4fa0de13a7b6eda79e59cba429ae9cfc5c9912d8a0a08b5aec35cb1dd8b81ed125d6cef8f00692dc2b3c31fdf0b", 0xa0, 0x8}, {&(0x7f0000000480)="7633b33be565f8fd2766d12912e9ed27d52f4ed141b9b7fe301a68550753dbc4078c98a27401af837fbbe70d1bda92e1eaab63a216e4896b45078397e020c6a6df2b1050e9d5aef748aca64e9cd274db4169fa86c4ad4ae76f2459c2fee29949d58cbb93bd2014c96f7866caacbcd6ef8d22415af4738f742a325b4143cb4485b8c5964c", 0x84, 0x7}], 0x14, &(0x7f0000000640)=ANY=[@ANYBLOB="acb11b621bcf7457900d53d46836036e57696eb3ca2c00"]) 16:18:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:18:11 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000340)=ANY=[@ANYBLOB="7374a1d124decd4d38ca1478861903726970653d3c7830303030303030303030303030302c00"]) r0 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x586, 0x3, &(0x7f0000000080)=[{&(0x7f00000003c0)="983999155032a990548a4998da7fd52c6300f6579ee0366789429145b287afaa104cdd363f4bec836102c12410f6fdab2973af5045867e8efc601b96b55534d9395c678d6747fcaa6bca04be8cf1c5feeab7e59bdf1284fb470d1c1426e005975ac0d7d99dd14d7e6621f3b06a734bd79d5908698fe012d702f5102c55f41b986c52e03bcb58eb284c902d61bb406d8df157fc686b3f5033c088c80e50ec55699c9ca9fe709da237ce6fdb9cc8e927b4b5c327af4ed5dca3b485180b851bc0b729892f5b9db07c550c27a20177a61cdb881d204279c8f646150d88fe0fb37ea70f533dd96113b37061e297c1a23b820057db35934d", 0xf5, 0x80000001}, {&(0x7f0000000240)="4b3eac1a6858f8cd991e45c73a202521258870370b42153bdb2260e087501f8848af954ec0dc176581a48e18ec319c1b3997e688a6d41550fa7d30b49d82eeb5b1cadd9860c89afaf5f62ac94cce85592d457fca3776243208c0678bf616d821e9c457bcc120ec13327c8d85f2ae64cbe2a5ca1700fec7572c266915781764168fe75c5fdebe", 0x86, 0x8}, {&(0x7f00000004c0)="43de9a76c799bcac8fb67492ef277a951c7595826c2bf13d0313d6efb78579622bfa0a776406f4b0677c9611652563134d5b26eedc273a70b1c192912cf9c6e5154fbe1ffe15416db4527c53487189e3474ff5cebdef2afa5c82cad26a1b0886f61c2b90688c3255d67e5195e6180f8a7a4b69667acaa0f04392107ac4fc2d50c47c6c1e0befbcd9a05db9a80de580bc20e2a52c5992ceface221a8b9440b1c10509ded07ef2f04e3d2ef7428927af70093de42b16b73e9424b475873c12db4cbc2f2ee8ae2a2dddd7fafe474e48386b9e9e764ec67f18df88a8cdc35d4bb124d195ae4e4cc44d146001237abcbf1ecaa4351475f3f2", 0xf6, 0x6}], 0x200000, &(0x7f0000000180)={[{'stripe'}, {'stripe'}, {'#'}, {'stripe'}, {'stripe'}], [{@uid_gt}]}) mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x10) 16:18:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/104, 0x68) r0 = syz_io_uring_setup(0x4d4c, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x2, 0x8010, 0xffffffffffffffff, 0x10000000) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x240000) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000280)=[0xffffffffffffffff, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, r5, r5], 0x8, 0x0, 0x1, {0x0, r10}}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd=r4, 0x7a, 0x0, 0x9, 0x1, 0x0, {0x0, r10}}, 0xbda0) flock(r0, 0x1) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB="7374726970653d307854ee38953030303030303030301c30302c00"]) 16:18:11 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x4, &(0x7f0000000240)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@nodevmap}, {@msize={'msize', 0x3d, 0x3}}, {@cache_none}], [{@hash}, {@context={'context', 0x3d, 'user_u'}}]}}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x1, 0x0, 0x0, 0x388468, &(0x7f0000001ac0)={[{@stripe={'stripe', 0x3d, 0x3}}]}) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='affs\x00', 0x1000000, 0x0) 16:18:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:11 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x34, 0x400000) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000003c0)=""/200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x9, 0x3ff, 0x80000001, 0x7fffffff}) 16:18:11 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8102, 0x0) [ 2875.454064] EXT4-fs: 15 callbacks suppressed [ 2875.454074] EXT4-fs (sda): Unrecognized mount option "st¡Ñ$ÞÍM8Êx†ripe=0xee00, 0xffffffffffffffff}}, './file0\x00'}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x8001, 0x1, &(0x7f0000000080)=[{&(0x7f00000003c0)="e416d6e272942c053531c67321886456f3ab5263731e1b3df2503e186eb42f491438d6e03c2447951e177750d90eb534888234c7ff81b477b21173961960a1a1c9b0d1b98885e0d230caaf50e167a36cbf701345c0e483f2edd2e190f0f16ce028f150427b6d95c89286d6a4941d8c15835991c0c4ffbffd8b5bf4c384f0233ed2014359de5de39b85292cc583c709d4ab5066c06fac5b7b987d639045310b42c6ad273fbf2d9f50bcd44a1d3a9d8dbdb5e73a05c658f37a5b766e46df738689b1421143f7feeb2ae532793147145fbcb750f254efa56ce925dd94a465f07e8eff317894508f5aec13eecdd48adc67b2184dd1", 0xf3, 0x81}], 0x0, &(0x7f0000000240)={[], [{@permit_directio}, {@fsname}, {@pcr={'pcr', 0x3d, 0x17}}, {@measure}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio}]}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff01, 0x0) 16:18:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) getdents64(r0, &(0x7f0000000000)=""/98, 0x62) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080)={0x87, 0x0, '\x00', [@ra={0x5, 0x2, 0x2}, @pad1]}, 0x10) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884020, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x5}) 16:18:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x3}) 16:18:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) [ 2891.347968] EXT4-fs: 11 callbacks suppressed [ 2891.347989] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.352534] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.354889] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.361594] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.364204] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.369395] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2891.382722] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2891.391925] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2891.394870] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2891.402306] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:18:27 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0xfffffffffffffff7, 0x4, &(0x7f0000000240)=[{&(0x7f0000000080)="8726c8966e8aaa7fd04f2ed7f063bef52546456b4ac0c51b21c516e0b7d089399185c9f77b785429c30ec6324c0bc8db6c2d788b11910b231ef7c8ef3526e30fd0776b31ca23c91eb1b94d125ef6ff3dceb393eef1878745b930e5497f9401020c759e0290acc76c5650fc16deed4391f9af56d9ae", 0x75, 0x63a}, {&(0x7f00000003c0)="8846b6260981c87a0d14d5e539f6f2b37bc6506822a3b2bdd606685c6b75cd72eb2da6deecafb8de2d0b385805463640ad4c1468e0ec6907c5416c79824fb0aa6673be870971630b544704de0e2e5dc9384eff388db3835601d4d3292f70ff63cd1a571f20082ac383d4ec281f20e33a0682667977cc83ec4971849aad33b90f50035a382d83f7f536c7ec803e68b90f22a21baac542e843c7ba9c65dac834e8c8a9ec727d8b161b3c38ac839732bf85dd2314a6f60b63cbeea292e3e04753702a2f9cf7c37e2e84e30fab0a38590ac2b40551d56a41f6cf169b43ce6c", 0xdd, 0x32}, {&(0x7f00000001c0)="b9c90c0fc2fe7e9da557d3f8c6c09f25d7db14b08499ce837a5f5d275a1efc4250471b8a9a37a2b39f2d556302", 0x2d, 0x800}, {&(0x7f00000004c0)="6bf3a77e7cb3afe7df7ccec5fe0b0104d5299af0aae2e63931bcedbf2f0609fee18eba7b786c9ab081a00df07381456b292d83697c0136937975bb48f4d16ddb5c851d01d64057ee22b4a611d3218234f1253f31fac5ec821b99eae6e3ff37d8ac50657046652fcbfcb27b1a9fcdfc566d097cc1d7669e6c8c05e7162489501e35096a50632a1779556cc445ffadd7129b0f44c9437fee3da213e1be52b888637ca4d5b5739530c4d61999714f2104bc683d28e4c3bb6fd8869f88cfe8b68a323001f0794c5f8522249918e71180c9eef1cf434a745deeadf0e2f3d5ebd125a2b64e26dee959c2be3c1779009e22", 0xee, 0x3}], 0x2000000, &(0x7f00000006c0)={[{@nonumtail}, {@nonumtail}, {@nonumtail}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'ascii'}}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}], [{@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@appraise_type}, {@fowner_lt={'fowner<', 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, 'q|\x17;~\xed\xaa\xbf\x97+_\xa0\xa4\xd92\xd4w\x17\xf2\x1bX=\x1f\xe2\x91\x12\xbc[\xcd\x0f\xb7f\xb9@\\\vF~\xa6\x1d\xb4\xe35\x96\xee\xa7\xde\xef\x10<](g^L\x92\xd2\xa2\x9ebb\xa4,\xd9\xc3\xc6\x19\xd3\xd7\a\x83\x9ar\x11\xe3\x9a\x9e\x0fE\xcd\xd7e\x92>\xe0\xa7\x84_\xde\xdb7\xda\x0e\xa8\x90Z\x06\xe3\xe3\xd4\xbc\xb2\xf0\"Ly\xe8\x1e\xf3\x9d\\}\x94\xbe\x96\xd47\xc8\x9b\xea\x10\x12\x1ch\tKe\f'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) 16:18:27 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) 16:18:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x4}) 16:18:27 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fcntl$setown(r0, 0x8, r1) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) lgetxattr(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)=@random={'user.', '#}\x00'}, &(0x7f00000003c0)=""/4096, 0x1000) 16:18:27 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="0074726970653d3078302c0000000000000000000000c27cf4ea0d000000007615bd4700024b0a7068d36642ee4d6c19e1e29b6b6da532700565f9daf1f2089e95c0d8d63eea2301ffff25c5f30d9fda7394f021b71d2660ce98375bf4ee57276e377b6b7a4e3d5140"]) 16:18:27 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x6}) 16:18:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) 16:18:27 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x1000a4, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x95) write$binfmt_script(r0, &(0x7f00000003c0)={'#! ', './file0', [{0x20, '{\',+'}], 0xa, "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"}, 0x1010) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x6000) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x40000, 0x85) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000001400)=""/252, &(0x7f0000000240)=0xfc) symlinkat(&(0x7f0000000040)='./file0/../file0\x00', r2, &(0x7f0000000080)='./file0/file0\x00') [ 2891.568060] FAT-fs (loop6): Unrecognized mount option "nnonumtail=1" or missing value 16:18:27 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, 0x0) 16:18:43 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf0ff1f, 0x0) 16:18:43 executing program 5: r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0), 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d30914030303030303030b030303030503c291c237ed912309f2fa6a5fd32523030302c00efc517b9c8939d309bd09bf3e79bfee8477be2f728027684b8ae57c828a8a6de23dd64ed1d8c18fe7b1045a713fba05f2df692574fa892634f1aba495998ed86a40f9d5b4ed1662b7525e53539f019de30ebf7b4825bd7044d136548a0a74b8353c79fec22d33249569f"]) 16:18:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x5}) 16:18:43 executing program 7: syz_io_uring_setup(0x4d4c, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close_range(r2, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0x10, 0x1, 0x1, 0x3, 0x3e, 0x2d, 0x1fb, 0x40, 0x4b, 0x200, 0x1, 0x38, 0x2, 0x7, 0x8, 0x236}, [{0x2, 0x3f, 0xa3, 0xaf, 0x8000, 0xfff, 0x2, 0x3}], "bce2a2b396899d2a658fbc20d07567a327703ce8cf499caea942855bbb81003122ed2daa95b06f4dcbaaf397de79116f5c1d0581d83f0a5b103be90e134de9ef635e8025446c96f0c5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8c1) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x1, 0x4007, @fd_index=0x2, 0x80000000, &(0x7f00000000c0)=[{&(0x7f0000000000)="b725f3f680667d7356b0705ec217d6cdac2abd012fc71c6ae8c6ec16d50d33261d67aa7f9d6035821705ea685cc5e1f0727140abeac419c34cf0cd645a8e3ad25d66f90098fb4f1c483862e39edb0d0fae07e8f41daa05ee78fc15ea247cccf1cadcfcb4503092b3ddee5a18f73da122534d0aa4e0eceaf98f4c91560aea51eb805ef8e767b7c6779d5669f935", 0x8d}], 0x1, 0x2, 0x1, {0x1}}, 0x8001) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close_range(r0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000040)=ANY=[@ANYBLOB='stripe\x00\x00\x00\x00000000000000J-000,\x00', @ANYRES64=r0]) 16:18:43 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:18:43 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d3078303030303030303030303030303030302c00c99fe267a2310658fe394a7684688264655d123183121e8be2778a4cb44fa239753ffacec7b06262f3a3d1098d8ed568cb92300f22412e6ee828c2fd95c3e0200da0b897099a19d1a3572f2f73cf45bfb6b017b4197f7bd3bd17c2606fb1b12f2f21fcc972b9b8229a78cdb64b760e88f6609a7087193f531644af410e45dad5951f93a71efb1a3accda5e097f570b4eafc4562dc2a27770ac298730e4"]) 16:18:43 executing program 1: r0 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000180)=ANY=[@ANYBLOB='stripe=0x000000000000>0000,\x00']) [ 2908.201696] EXT4-fs: 16 callbacks suppressed [ 2908.201712] EXT4-fs (sda): Unrecognized mount option "stripe=0x000000000000>0000" or missing value [ 2908.212920] EXT4-fs (sda): Unrecognized mount option "stripe=0‘@0000000°0000P<)#~Ù0Ÿ/¦¥ý2R000" or missing value [ 2908.249360] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2908.262897] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:18:44 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x220000, 0x30c) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) renameat2(r0, &(0x7f0000000040)='./file0/../file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) [ 2908.270535] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2908.272529] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue [ 2908.274880] EXT4-fs (sda): Unrecognized mount option "stripe" or missing value [ 2908.282832] EXT4-fs (sda): Unrecognized mount option "" or missing value 16:18:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf0ffff, 0x0) [ 2908.299566] EXT4-fs (sda): Unrecognized mount option "" or missing value [ 2908.310460] EXT4-fs (sda): re-mounted. Opts: stripe=0x0000000000000000,,errors=continue 16:18:44 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) close_range(r0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000380)='./mnt\x00', 0x58080, 0x44) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0x400}, 0x1c) splice(r0, &(0x7f0000000180), r1, &(0x7f00000001c0)=0x47, 0x4, 0x2) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) mount(&(0x7f0000000000)=@sr0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='cramfs\x00', 0x4, &(0x7f00000000c0)='\x00') syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)=ANY=[@ANYBLOB='stri=0x0000000000000000,\x00']) 16:18:44 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x8}) 16:18:44 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="73303070303030302cc24bace28b760a4d814673e6062343d4e65d24e22d75898bbafd8d05ad245f74921ebb00b4d91b0b4cac0d9897cf9ac2ac240da81e7f6ad059c89ea36965"]) 16:18:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x6}) 16:18:44 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xfffffffffffffec1, 0x0, 0x388460, &(0x7f0000000000)={[{@stripe}, {@abort}]}) 16:18:44 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000340)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0/../file0\x00', 0x1000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="08c82cc3cc6dd7d01dbaa930b4ba65ca178cf8e9d0254066a60b5b0c75a5b0df2a2abc6ce424e0868a7fa34494b847e6f26cd1053a743d34e25fb72a52dc8d7ac181b3fbeefc8be39d727e1ac650e795fcd161aa2b479931c2d7d263113289a7ed6f95271d0e31f4410803ed2cfae70d454f8cd3f1d7ac3a71c7d28d270b4e909f543237ed45667c3cc64abe671ce148e4e4bd0f06ab5757811c38", 0x9b}, {&(0x7f00000003c0)="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", 0xff, 0xffff}, {&(0x7f0000000080)="bc1aef4388c0d85038f76532633d771bd25f35a890e5f7eb6026a17b0fd1775a3955b51319c0ca1aa95597eba8bbfbe07a200a965acde74deb803e767042af3b436cb0824441f2bf4e38cd", 0x4b, 0x96}], 0x4, &(0x7f0000000540)={[{@size={'size', 0x3d, [0x2d, 0x39, 0x2d, 0x6d, 0x35]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6d, 0x31, 0x2d, 0x37, 0x38, 0x4e, 0x65, 0x6b]}}, {@gid={'gid', 0x3d, r0}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@mpol={'mpol', 0x3d, {'bind', '=static'}}}, {@mode}, {@huge_never}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'stripe'}}, {@euid_gt={'euid>', r1}}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, '$,]{'}}]}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) [ 2908.500846] EXT4-fs error (device sda): ext4_remount:5895: Abort forced by user [ 2908.507773] tmpfs: Bad value for 'size' [ 2908.511063] Aborting journal on device sda-8. [ 2908.515440] EXT4-fs error (device sda) in ext4_reserve_inode_write:5869: Journal has aborted [ 2908.520079] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal [ 2908.522801] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal [ 2908.525276] EXT4-fs error (device sda): ext4_journal_check_start:83: Detected aborted journal [ 2908.533413] EXT4-fs error (device sda): ext4_evict_inode:330: inode #15971: comm syz-executor.4: mark_inode_dirty error [ 2908.547052] EXT4-fs error (device sda): ext4_remount:5895: Abort forced by user 16:18:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x28acc28, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext3\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000000000)=ANY=[@ANYBLOB="7374726970653d30783030303030303030868278bb3f30304d30303030302c00"]) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0xffff, 0x2, &(0x7f0000000340)=[{&(0x7f0000000180)="4f666a1f1e30499c164e68bf5d55aa3883c20789777c478c8a7d2192707d6f4f6c228b9dd3e89edc9af5525b9791625c829576a321fafb49dfb157df637139e82d7b2314f1455eea40f8d84a0da88bf5ea0c4a6d0e88c15e66b8a4ecf6", 0x5d, 0xb}, {&(0x7f0000000200)="806364e692c3f165ad0e3cb0f11fdf67e2846f8f2cc01ff2ff7a6342e14d808c0083fd841e30d1dab1b241f48e99f065259ef44381cc7529d5a93fe94dd95588fa28ff74a06972f0b9d2c0cff61ef84e2f978c3e0de818885be42ad01d8248cd0c96311f306882c48ea68590df49e74f1cc2bfc54e0f7c84e4e60b533282ecc28ca58a87127ff7df101149bc46be26ea382a6493c1f4bc6c82ae10fe8b3c5d52cd11f18615cbb818774aac408896e83b57c5f2b8d6526fe4bc411052a4e10a8911badf8bf23c62e3eae7d98efdd573629866ed5642", 0xd5}], 0x4080, &(0x7f0000000480)={[{@usrjquota_path={'usrjquota', 0x3d, './file0/../file0'}}, {@nombcache}], [{@hash}, {@subj_type={'subj_type', 0x3d, 'ext3\x00'}}, {@appraise}, {@uid_gt={'uid>', r0}}, {@fowner_eq}, {@pcr={'pcr', 0x3d, 0x20}}, {@subj_role={'subj_role', 0x3d, 'ext3\x00'}}, {@appraise}]}) 16:18:55 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 16:18:55 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x9}) 16:18:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:55 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}], [], 0x7}) 16:18:55 executing program 2: mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000, 0x5, &(0x7f0000001500)=[{&(0x7f0000000500)="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", 0x1000, 0x5}, {&(0x7f0000000080)="b2c09f20a93abb444a2f53033f91b9502b84d5da33ab560c74686b641b12fa2522461a72436278b39f66b622", 0x2c, 0x5768a906}, {&(0x7f00000000c0)="0a256faf3785fc190ca0175c3e59322863eb5506e65e3db7b96608ff3be4b3db679add78df2b823d6f3fa74093ca88d23d4d4cea9a0764ce3c36c933d764de16720aea6aff23364a3d88e0eb1a8829a1e4", 0x51, 0x2}, {&(0x7f0000000180)="cf5f75e72fd77d8899", 0x9, 0x1}, {&(0x7f0000000240)="c8545d9195939f3823c50badac75a482d90986b6b2b4f812803277c415f6a3a5b5bb2e9bdd672bb11eba4bbee98c2a16e5b158ac9d25eb963e2f2b61c1e8346729dd23d6ff89d5f4e27d0d475f4e18f485f526086b99d89292b81ccf62f752c3326ef68ea77d483a991185d228683bdd415b9f398a5a1e476fd12f0610adc0257d30d35b1415e6e65792a53da661ee463dc0039dd924a5fd1e", 0x99, 0x400}], 0x3008880, &(0x7f0000001580)={[{@huge_never}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x25, 0x30]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x67, 0x33, 0x65, 0x37, 0x6d, 0x31, 0x78, 0x6d, 0x32, 0x65]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x83, 0x2d, 0x67, 0x39, 0x31, 0x67]}}, {@huge_within_size}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_lt={'uid<', 0xee00}}, {@fsname={'fsname', 0x3d, ']'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext2\x00'}}, {@fowner_lt={'fowner<', 0xee01}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x34, 0x61, 0x30, 0x38, 0x0, 0x64, 0x37], 0x2d, [0x61, 0x39, 0x62, 0x32], 0x2d, [0x31, 0x33, 0x38, 0x65], 0x2d, [0x38, 0x32, 0x0, 0x38], 0x2d, [0x13d66c09462c44fc, 0x62, 0x39, 0x35, 0x61, 0x31, 0x66, 0x39]}}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r0}}]}) 16:18:55 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x4, &(0x7f0000000180)=[{&(0x7f00000003c0)="d719a5cf8102f29b2b54dc7cced5cf81dfd95869efba8f39b6f1b95b4a90a6d383f133801e82f15ba299e5ef49771f8d91a70973575d22689032cb577059f8e9a7df423d8e4ce5bbff633167ca3308c04bfbce9176603b5b2d79bcabe0ddd31bfee70c7da542a4758bba97b3ec52e1ec65e06f3d331a244ff580d1735db503f74b054c03cf2c01d128c3175a9551cb5b9e41af270469e07510b9cbbbd65d2b440806096d00041e52e7fe862afe67d5e92a359ed800539a1e14b0195504bd14d4881d42beb0afd57645fee93e487d10189b16e19d3a73276e72455e670eca2f9c1f292c58ef136c0f7f64c8bea38ff9abf2b5", 0xf2, 0x4}, {&(0x7f0000000080)="73efd36165c8fc67a3e08d8ce9fc190b0967", 0x12, 0x2}, {&(0x7f00000004c0)="ae44ace7b62b6bdac4dd6384947ca5aea917b70d752b80c77f241ce2abe03b3cd1c0e04368abd55f71e9023759d738e5b37f7e659c79c7c7abf033451541fc17d6946586c16dae9aee79532ecf5227f71abc5fe986c3b52166da26d47aab2ec13f0fd4a210f91ca787773265bba7b161f66dcc53bb9aa2fe0376891b9c9d16eaa54c126ae6e6afdd3a37aa32ea4da851df9b5a3192e3bd0d3a11895f60070adb1c55a3a8628ab575f47409f02e52b4ad76bb6e0f4530df5080983b4c2179dd26984ede0384793aafa8abe6aafe93e7650891e99766c9f7e000dd3ae17666094196e6dee402fc", 0xe6, 0x4606}, {&(0x7f0000000240)="aed8f31eea6229bae23e0ba4367d3e7969135aacdc9bf452838440957850be3616bc5b3b5561c08b4c0df83c43a4390ac0fddf4bff5b089f4f97a66b9388e467b97a3d84a2261ebe8f6206f436fb56cff9c9be907acf497358e30b5ebb117e19c93091da9dea7d6fbefa320828bc17b2aaf516db3f1e00b20dada9c6ae2c4c44316a773bf6e8661ea605c40dc41b08be18d65d8586f1", 0x96}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="2627102c65787432002c73747269706d2c65787432002c65787432002c7374726970652c7374726970652c73747269000000004dd0249f7970653d65787432002c00"]) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f0000001ac0)={[{@stripe}]}) 16:18:55 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x53000, 0x0) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x388460, &(0x7f00000003c0)=ANY=[@ANYBLOB="7374726970653d30780c590006d24e000000000000000000050000000000be6bf3ed6df68430491cbab3d56ce449aba4f42c012f9158822f91a75d76f11d8a9bb845d003787c329041705caaa28c687e0cf7f16a3fc53ae5cce0b583c3d77d"]) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000280)=[0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6, r2, r2], 0x8, 0x0, 0x1, {0x0, r7}}, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd=r0, 0x0, 0x0, 0x9, 0x1, 0x0, {0x0, r7, r0}}, 0x3) 2025/02/03 16:19:08 executor 4 failed 11 times: failed to create temp dir: mkdir syzkaller-testdir021000260: read-only file system VM DIAGNOSIS: 16:19:09 Registers: info registers vcpu 0 RAX=ffff888018308000 RBX=ffff88806ce09a98 RCX=ffffffff85a3baa0 RDX=dffffc0000000000 RSI=ffff888018307c78 RDI=ffff88806ce09a68 RBP=ffff888018307c78 RSP=ffff88806ce09950 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000032042 R11=1ffff1100d9c1338 R12=ffff88806ce09a58 R13=ffff888018300000 R14=1ffff1100d9c1338 R15=ffffffff85a3baa4 RIP=ffffffff81107247 RFL=00000283 [--S---C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f24d391f900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 ffffc90000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd3728f16f8 CR3=0000000014f46000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=561df7c08deff6a4de47f0c6e479b410 XMM02=9d301567ad96c91e0000000000110030 XMM03=4a01f3544ac6db450000000000110108 XMM04=aed49bda942708e100000000000ae968 XMM05=0e3c6b7ebfa1e3eb0000000000687ac8 XMM06=375afdebbf381c810000000000124fa8 XMM07=4a01f3544ac6db450000000000110108 XMM08=9d301567ad96c91e0000000000110030 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000607f92e0b988 RBX=ffff88800925ab00 RCX=0000000057c47d23 RDX=1ffff1100124b560 RSI=db8965fc5fa204a7 RDI=ffff88806cf3c128 RBP=ffff88806cf38ce0 RSP=ffff88806cf09d58 R8 =0000000000000000 R9 =ffffffff8686a6e7 R10=0000000000000046 R11=0000000000000001 R12=0000000000000c08 R13=0000000000000292 R14=0000000000000200 R15=ffff88806cf38cf0 RIP=ffffffff816e6b6b RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe5900000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb5196ed328 CR3=000000000d444000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000258 XMM01=000000000000000000000000ff0000ff XMM02=000000000000000000000000ff0000ff XMM03=746964646120726f66206b6365684320 XMM04=737973722e7777772f2f3a7370747468 XMM05=2e656e6f20736968742065726f666562 XMM06=6c616e6f69746964646120726f66206b XMM07=656220746f6e20646c756f63202c7473 XMM08=7261747320676f6c73797372004b4f00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000