ffffffffffff9}, 0x0, 0x0, r2, 0x1) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) 04:02:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r5}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r6, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r6, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="0000b101", @ANYRESDEC=r6, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f00000000c0)={r6, 0x1, 0xc500, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0xb, 0x2, {0x0, @struct={0x23, 0xffffffff}, 0x0, 0xc15e, 0x1, 0x3, 0xffffffffffffff27, 0x20, 0x473, @struct={0x7, 0x6}, 0x8, 0xfff, [0xf5a, 0xffffffffffffff9d, 0xbefe, 0x1, 0x1000, 0xfffffffffffffff9]}, {0xb40a, @struct={0x1, 0x7f}, r3, 0x6, 0xa400000, 0x7e35, 0x3, 0x0, 0x84, @struct={0x1, 0xfff}, 0xc012, 0x20, [0xffffffffffffff1c, 0x10000, 0x8, 0x0, 0xd980000000000000, 0xffffffff80000000]}, {0xffffffffffff326c, @usage=0x10001, r6, 0x10001, 0x5e, 0xb2, 0x7ff, 0x40, 0x8, @usage=0x6, 0x4c, 0x0, [0x0, 0x2a73, 0x0, 0x401, 0x3, 0xfffffffffffffffa]}, {0x8, 0x80, 0x7f}}) [ 482.912285] loop3: detected capacity change from 0 to 16776704 04:02:55 executing program 5: r0 = syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 482.954576] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 482.954576] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 482.954576] [ 482.963397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 483.001496] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 483.004050] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:03:10 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x7) 04:03:10 executing program 6: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup3(r1, r0, 0x0) fchmod(r1, 0xb2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000740)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000080000001000000000006000000000000000000000001000000010000000000000000000000000000000000000000000000000000000000000001000000edfdffff177000000000000007000000000000000200000000000000ff0f000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007c45e13fb437a29365260b82cdc7c85bc6b802cbbd7d4443ac1bd70cbdfe65e0d9940512d73e9bb0706f798d6926cffa13b23ea7830702628605f937235b1450bba98227bbcb706d3cdb"]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@private2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private1}}, &(0x7f00000000c0)=0xe8) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="08f36900"], 0x4c}, 0x1, 0x0, 0x0, 0x20000800}, 0x4040) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000680)={0x0, @generic={0x3, "b389797af020c8e504eeb7236efe"}, @isdn={0x22, 0x9, 0x0, 0x7, 0x40}, @can={0x1d, r5}, 0x2, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)='lo\x00', 0x8e25, 0x7, 0x3800}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@private, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000140)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2f055c2cf614a05e6062b80000000acf030026bd7000fbdbdf250000000014001500fc02000000000000000000000000d4856fb56d51c41b4256a367a4c428813b983b66356d708b90203384e21134875ddc7e861e653781638068458c6c701521aea4d2c8f05861529d728c91ca7fe1ddf4f64907781a9a82e7fe9e376b09403f083251b9d5cf574dedd763ebe4df8193ab3cc116831c41fbf86608e633a30826dee0d09b91d9a43da377bac70d5db3a71b9abaa0432601a0", @ANYRES32=r3, @ANYBLOB="200cd34487dd57bcee01709c24c46a1e4e163ca126492356e85ffe57d60d83131742a949a80b4aff6b953ca970df47560f0f691adcaec1d3afd3c69fa50d96377108860ca06b4c9a1c9cd16a6b2737164da0efb982991f916a0236f88a4ba4a97ca379f901a2b6c7c0d98372e7cf52bd69bb6f07d755bd7b6c08008d00", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00'], 0xb8}}, 0x800) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000000cc0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b80)={0xfc, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x5}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x8004}, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32323330373039383000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040000c00000000000000daf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000004300000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000daf4655fdaf4655fdaf4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011600)="20000000641e8ebf641e8ebf00000000daf4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011700)="8081000000601020daf4655fdaf4655fdaf4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000daf4655f00"/160, 0xa0, 0x2600}, {&(0x7f0000011800)="c041000000380000daf4655fdaf4655fdaf4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000020000000", 0x40, 0x2a00}, {&(0x7f0000011900)="20000000000000000000000000000000daf4655f000000000000000000000000000002ea00"/64, 0x40, 0x2a80}, {&(0x7f0000011a00)="ed4100003c000000dbf4655fdbf4655fdbf4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000904a5ec200000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011b00)="ed8100001a040000dbf4655fdbf4655fdbf4655f00000000000001004000000000000800010000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000046b58a6000000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011c00)="ffa1000026000000dbf4655fdbf4655fdbf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3232333037303938302f66696c65302f66696c65300000000000000000000000000000000000000000000029d1c2e100000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011d00)="ed8100000a000000dbf4655fdbf4655fdbf4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bae0739c00000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000dbf4655fdbf4655fdbf4655f00000000000002004000000000000800010000000af3010004000000000000000000000005000000600000000000000000000000000000000000000000000000000000000000000000000000000000005162155f00000000000000000000000000000000000000000000000020000000641e8ebf641e8ebf641e8ebfdbf4655f641e8ebf0000000000000000", 0x1a0, 0x2e00}, {&(0x7f0000011f00)="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", 0x100, 0x3000}, {&(0x7f0000012000)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012100)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x10000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012800)="504d4d00504d4dffdbf4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033320075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x28000}], 0x0, &(0x7f0000012e00)) 04:03:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r5}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r6, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r6, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="0000b101", @ANYRESDEC=r6, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f00000000c0)={r6, 0x1, 0xc500, 0x1}) 04:03:10 executing program 2: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000006, 0x50, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x2e3e, &(0x7f0000000000)={0x0, 0xd205, 0x4, 0x2, 0x2fa}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)=0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup3(r4, r3, 0x0) syz_io_uring_setup(0x3b9d, &(0x7f00000001c0)={0x0, 0xe64b, 0x4, 0x2, 0x214, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000240)) syz_io_uring_setup(0x3a84, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) syz_io_uring_submit(r6, r8, &(0x7f0000000280)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, r5}, 0x80000000) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000100)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x4000, @fd=r3, 0xf4, 0x0, 0x0, 0x2, 0x0, {0x1}}, 0x80) 04:03:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 10) 04:03:10 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:03:10 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan3\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) [ 497.984034] kauditd_printk_skb: 102 callbacks suppressed [ 497.984052] audit: type=1326 audit(1766462590.862:253): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 497.998880] audit: type=1326 audit(1766462590.876:254): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.008200] loop3: detected capacity change from 0 to 16776704 [ 498.009804] FAULT_INJECTION: forcing a failure. [ 498.009804] name failslab, interval 1, probability 0, space 0, times 0 [ 498.009827] CPU: 0 PID: 5631 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 498.009838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 498.009845] Call Trace: [ 498.009870] dump_stack+0x107/0x167 [ 498.009903] should_fail.cold+0x5/0xa [ 498.009927] ? __alloc_skb+0x6d/0x5b0 [ 498.009953] should_failslab+0x5/0x20 [ 498.019056] kmem_cache_alloc_node+0x55/0x330 [ 498.020009] ? mark_held_locks+0x9e/0xe0 [ 498.020890] __alloc_skb+0x6d/0x5b0 [ 498.021688] netlbl_mgmt_version+0x7c/0x340 [ 498.022596] ? netlbl_mgmt_listall+0x250/0x250 [ 498.023570] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 498.024963] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 498.026344] genl_family_rcv_msg_doit+0x22d/0x330 [ 498.027365] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 498.028770] ? genl_op_from_small+0x23/0x3d0 [ 498.029696] ? genl_get_cmd+0x3cf/0x480 [ 498.030536] genl_rcv_msg+0x36a/0x5a0 04:03:10 executing program 5: r0 = syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 498.031344] ? genl_get_cmd+0x480/0x480 [ 498.032370] ? netlbl_mgmt_listall+0x250/0x250 [ 498.033351] ? lock_release+0x680/0x680 [ 498.034195] ? __lockdep_reset_lock+0x180/0x180 [ 498.035187] netlink_rcv_skb+0x14b/0x430 [ 498.036051] ? genl_get_cmd+0x480/0x480 [ 498.036915] ? netlink_ack+0xab0/0xab0 [ 498.037758] ? netlink_deliver_tap+0x1c4/0xcc0 [ 498.038727] ? is_vmalloc_addr+0x7b/0xb0 [ 498.039602] genl_rcv+0x24/0x40 [ 498.039621] netlink_unicast+0x6ce/0xa00 [ 498.039650] ? netlink_attachskb+0xab0/0xab0 [ 498.039686] netlink_sendmsg+0x90f/0xe00 [ 498.039717] ? netlink_unicast+0xa00/0xa00 [ 498.039753] ? netlink_unicast+0xa00/0xa00 [ 498.039777] __sock_sendmsg+0x154/0x190 [ 498.039800] ____sys_sendmsg+0x70d/0x870 04:03:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 11) [ 498.039826] ? sock_write_iter+0x3d0/0x3d0 [ 498.039840] ? do_recvmmsg+0x6d0/0x6d0 [ 498.039866] ? SOFTIRQ_verbose+0x10/0x10 [ 498.039884] ? lock_downgrade+0x6d0/0x6d0 [ 498.039908] ? __lockdep_reset_lock+0x180/0x180 [ 498.039925] ? SOFTIRQ_verbose+0x10/0x10 [ 498.039949] ___sys_sendmsg+0xf3/0x170 [ 498.039970] ? sendmsg_copy_msghdr+0x160/0x160 [ 498.039997] ? __fget_files+0x2cf/0x520 [ 498.040017] ? lock_downgrade+0x6d0/0x6d0 [ 498.040039] ? find_held_lock+0x2c/0x110 [ 498.040075] ? __fget_files+0x2f8/0x520 [ 498.040107] ? __fget_light+0xea/0x290 [ 498.040136] __sys_sendmsg+0xe5/0x1b0 [ 498.040154] ? __sys_sendmsg_sock+0x40/0x40 [ 498.040174] ? rcu_read_lock_any_held+0x75/0xa0 [ 498.040218] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 498.040240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 498.040256] ? trace_hardirqs_on+0x5b/0x180 [ 498.040281] do_syscall_64+0x33/0x40 [ 498.040302] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 498.040315] RIP: 0033:0x7feff7241b19 [ 498.040333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 498.040344] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 498.040366] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 498.040378] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 498.040389] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 498.040401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.040413] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 498.068021] audit: type=1326 audit(1766462590.876:255): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068160] audit: type=1326 audit(1766462590.876:256): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068255] audit: type=1326 audit(1766462590.882:257): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068353] audit: type=1326 audit(1766462590.882:258): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068457] audit: type=1326 audit(1766462590.882:259): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068550] audit: type=1326 audit(1766462590.883:260): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068782] audit: type=1326 audit(1766462590.883:261): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.068873] audit: type=1326 audit(1766462590.883:262): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5617 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 498.082537] loop6: detected capacity change from 0 to 1048576 [ 498.112357] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 498.112357] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 498.112357] [ 498.118111] FAULT_INJECTION: forcing a failure. [ 498.118111] name failslab, interval 1, probability 0, space 0, times 0 [ 498.118133] CPU: 1 PID: 5639 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 498.118145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 498.118151] Call Trace: [ 498.118178] dump_stack+0x107/0x167 [ 498.118203] should_fail.cold+0x5/0xa [ 498.118227] ? create_object.isra.0+0x3a/0xa30 [ 498.118247] should_failslab+0x5/0x20 [ 498.118267] kmem_cache_alloc+0x5b/0x310 [ 498.118287] ? __nla_validate_parse+0x2d8/0x2b10 [ 498.118320] create_object.isra.0+0x3a/0xa30 [ 498.118343] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 498.118380] kmem_cache_alloc_node+0x169/0x330 [ 498.118418] __alloc_skb+0x6d/0x5b0 [ 498.118462] netlbl_mgmt_version+0x7c/0x340 [ 498.118490] ? netlbl_mgmt_listall+0x250/0x250 [ 498.118524] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 498.118550] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 498.118586] genl_family_rcv_msg_doit+0x22d/0x330 [ 498.118621] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 498.118665] ? genl_op_from_small+0x23/0x3d0 [ 498.118695] ? genl_get_cmd+0x3cf/0x480 [ 498.118731] genl_rcv_msg+0x36a/0x5a0 [ 498.118767] ? genl_get_cmd+0x480/0x480 [ 498.118796] ? netlbl_mgmt_listall+0x250/0x250 [ 498.118835] ? lock_release+0x680/0x680 [ 498.118861] ? __lockdep_reset_lock+0x180/0x180 [ 498.118898] netlink_rcv_skb+0x14b/0x430 [ 498.118927] ? genl_get_cmd+0x480/0x480 [ 498.118957] ? netlink_ack+0xab0/0xab0 [ 498.119001] ? netlink_deliver_tap+0x1c4/0xcc0 [ 498.119028] ? is_vmalloc_addr+0x7b/0xb0 [ 498.119062] genl_rcv+0x24/0x40 [ 498.119085] netlink_unicast+0x6ce/0xa00 [ 498.119123] ? netlink_attachskb+0xab0/0xab0 [ 498.119181] netlink_sendmsg+0x90f/0xe00 [ 498.211671] ? netlink_unicast+0xa00/0xa00 [ 498.211711] ? netlink_unicast+0xa00/0xa00 [ 498.213652] __sock_sendmsg+0x154/0x190 [ 498.213676] ____sys_sendmsg+0x70d/0x870 [ 498.213702] ? sock_write_iter+0x3d0/0x3d0 [ 498.213716] ? do_recvmmsg+0x6d0/0x6d0 [ 498.213743] ? SOFTIRQ_verbose+0x10/0x10 [ 498.213760] ? lock_downgrade+0x6d0/0x6d0 [ 498.213785] ? __lockdep_reset_lock+0x180/0x180 [ 498.213803] ? SOFTIRQ_verbose+0x10/0x10 [ 498.213827] ___sys_sendmsg+0xf3/0x170 [ 498.213848] ? sendmsg_copy_msghdr+0x160/0x160 [ 498.213874] ? __fget_files+0x2cf/0x520 [ 498.213895] ? lock_downgrade+0x6d0/0x6d0 [ 498.213917] ? find_held_lock+0x2c/0x110 [ 498.213952] ? __fget_files+0x2f8/0x520 [ 498.213985] ? __fget_light+0xea/0x290 [ 498.214015] __sys_sendmsg+0xe5/0x1b0 [ 498.214032] ? __sys_sendmsg_sock+0x40/0x40 [ 498.214052] ? rcu_read_lock_any_held+0x75/0xa0 [ 498.214096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 498.214118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 498.214135] ? trace_hardirqs_on+0x5b/0x180 [ 498.214159] do_syscall_64+0x33/0x40 04:03:11 executing program 5: r0 = syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:11 executing program 2: syz_io_uring_setup(0x0, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x2090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x890c, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@private0, 0x0, r5}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0x6, 0x7}, 0x20) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x190) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x4c}, 0x2000000, r9}) [ 498.214179] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 498.214193] RIP: 0033:0x7feff7241b19 [ 498.214212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 04:03:11 executing program 5: r0 = syz_io_uring_setup(0x4d4f, 0x0, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r5, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r5, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="0000b101", @ANYRESDEC=r5, @ANYBLOB=':18446744073709551609P']) [ 498.214223] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 498.214245] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 498.214257] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 498.214268] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 498.214279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 498.214291] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 498.258026] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 498.332532] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:03:28 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:03:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 12) 04:03:28 executing program 2: ptrace(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r1 = clone3(&(0x7f0000000540)={0x200140480, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300), {0x2}, &(0x7f0000000340)=""/202, 0xca, &(0x7f0000000440)=""/178, &(0x7f0000000500)}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file1\x00'}) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x9, 0x9, 0x0, 0x6, 0x80, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x74e}, 0x100, 0x6, 0x7, 0x4, 0x7, 0x1, 0x1, 0x0, 0x149, 0x0, 0x401}, r1, 0x6, r2, 0x9) ptrace$getregset(0x4204, r0, 0x6, &(0x7f0000000200)={&(0x7f00000001c0)=""/29, 0x1d}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='ns\x00') r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001800)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000017c0)={&(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/59, 0x3b}, {&(0x7f0000000100)=""/51, 0x33}, {&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000340)=""/175, 0xaf}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/219, 0xdb}, {&(0x7f0000000540)=""/168, 0xa8}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/160, 0xa0}], 0x9, &(0x7f0000001780)}, 0x0, 0x10101, 0x1, {0x3, r4}}, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000b80)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd, 0x8, 0x0, 0x4, 0x4, 0x0, {0x0, r4}}, 0x20) r5 = dup(r3) fchmodat(r5, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x14}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r7, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file1\x00'}) copy_file_range(r7, 0x0, r6, 0x0, 0x10001, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r6, r8, 0x0, 0x20d315) 04:03:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r5, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r5, "ce6e765f732580663ee20319cf5555dd"}) 04:03:28 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:28 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan3\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) 04:03:28 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:03:28 executing program 6: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x6, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @loopback}}}, 0x108) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/mem_sleep', 0x5110c0, 0x20) sendfile(r2, r2, 0x0, 0x4) [ 515.222657] kauditd_printk_skb: 88 callbacks suppressed [ 515.222676] audit: type=1326 audit(1766462608.100:351): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.237902] FAULT_INJECTION: forcing a failure. [ 515.237902] name failslab, interval 1, probability 0, space 0, times 0 [ 515.240273] audit: type=1326 audit(1766462608.108:352): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.240412] audit: type=1326 audit(1766462608.108:353): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.244813] CPU: 0 PID: 5679 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 515.250687] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 515.252435] Call Trace: [ 515.253006] dump_stack+0x107/0x167 [ 515.253772] should_fail.cold+0x5/0xa [ 515.254582] should_failslab+0x5/0x20 [ 515.255381] __kmalloc_node_track_caller+0x74/0x3b0 [ 515.256442] ? netlbl_mgmt_version+0x7c/0x340 [ 515.257408] __alloc_skb+0xb1/0x5b0 [ 515.258186] netlbl_mgmt_version+0x7c/0x340 [ 515.259093] ? netlbl_mgmt_listall+0x250/0x250 [ 515.260061] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 515.261459] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 515.262840] genl_family_rcv_msg_doit+0x22d/0x330 [ 515.263864] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 515.265274] ? genl_op_from_small+0x23/0x3d0 [ 515.266205] ? genl_get_cmd+0x3cf/0x480 [ 515.267052] genl_rcv_msg+0x36a/0x5a0 [ 515.267865] ? genl_get_cmd+0x480/0x480 [ 515.268709] ? netlbl_mgmt_listall+0x250/0x250 [ 515.269699] ? lock_release+0x680/0x680 [ 515.270545] netlink_rcv_skb+0x14b/0x430 [ 515.271419] ? genl_get_cmd+0x480/0x480 [ 515.272274] ? netlink_ack+0xab0/0xab0 [ 515.273127] ? netlink_deliver_tap+0x1c4/0xcc0 [ 515.274093] ? is_vmalloc_addr+0x7b/0xb0 [ 515.274951] genl_rcv+0x24/0x40 [ 515.275656] netlink_unicast+0x6ce/0xa00 [ 515.276522] ? netlink_attachskb+0xab0/0xab0 [ 515.277467] netlink_sendmsg+0x90f/0xe00 [ 515.278341] ? netlink_unicast+0xa00/0xa00 [ 515.279250] ? netlink_unicast+0xa00/0xa00 [ 515.280140] __sock_sendmsg+0x154/0x190 [ 515.281198] ____sys_sendmsg+0x70d/0x870 [ 515.281562] loop3: detected capacity change from 0 to 16776704 [ 515.282091] ? sock_write_iter+0x3d0/0x3d0 [ 515.282107] ? do_recvmmsg+0x6d0/0x6d0 [ 515.282133] ? SOFTIRQ_verbose+0x10/0x10 [ 515.282151] ? lock_downgrade+0x6d0/0x6d0 [ 515.282176] ? __lockdep_reset_lock+0x180/0x180 [ 515.282193] ? SOFTIRQ_verbose+0x10/0x10 [ 515.282217] ___sys_sendmsg+0xf3/0x170 [ 515.282240] ? sendmsg_copy_msghdr+0x160/0x160 [ 515.290389] ? __fget_files+0x2cf/0x520 [ 515.291228] ? lock_downgrade+0x6d0/0x6d0 [ 515.292099] ? find_held_lock+0x2c/0x110 [ 515.292975] ? __fget_files+0x2f8/0x520 [ 515.293835] ? __fget_light+0xea/0x290 [ 515.294666] __sys_sendmsg+0xe5/0x1b0 [ 515.295469] ? __sys_sendmsg_sock+0x40/0x40 [ 515.296396] ? rcu_read_lock_any_held+0x75/0xa0 [ 515.297412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 515.298518] ? syscall_enter_from_user_mode+0x1d/0x50 [ 515.299606] ? trace_hardirqs_on+0x5b/0x180 [ 515.300523] do_syscall_64+0x33/0x40 [ 515.301316] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 515.302395] RIP: 0033:0x7feff7241b19 [ 515.303173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 515.307019] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 515.308618] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 515.310129] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 515.311635] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 515.313136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 515.314664] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 515.322263] loop7: detected capacity change from 0 to 16776704 04:03:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf250b000000080031008b00000008000300", @ANYRES32=0x0, @ANYBLOB="08043100ff7f000005002a0000fce187f5ced0b04f9ecc196f4a23b40000000800340008004c5778262f000100000005002f0001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000180)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000340)={'wpan0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wpan4\x00'}) [ 515.349140] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 515.349140] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 515.349140] [ 515.355760] audit: type=1326 audit(1766462608.108:354): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.386925] audit: type=1326 audit(1766462608.109:355): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:28 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 515.417407] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 515.419865] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 515.419865] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 515.419865] [ 515.429966] audit: type=1326 audit(1766462608.109:356): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.466586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5705 comm=syz-executor.6 [ 515.469467] audit: type=1326 audit(1766462608.114:357): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r5, 0x5, 0x8}) [ 515.502857] audit: type=1326 audit(1766462608.114:358): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:28 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 515.525539] loop6: detected capacity change from 0 to 16776704 [ 515.535376] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 515.543693] audit: type=1326 audit(1766462608.116:359): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 515.555324] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 515.555324] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 515.555324] [ 515.577774] audit: type=1326 audit(1766462608.116:360): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:28 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_acct\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) r5 = socket$inet(0x2, 0x5, 0x6) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pread64(r0, &(0x7f00000002c0)=""/138, 0x8a, 0x3) dup3(r7, r6, 0x0) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r9, r8, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r11, r10, 0x0) poll(&(0x7f0000000040)=[{r10}], 0x1, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f00000001c0)={0xfffffffffffffff7, 0x1, 0x6, 0x0, 0x0, [{{r6}}, {{r9}, 0x2}, {{r3}, 0x20000}, {{r4}, 0x7fffffff}, {{r10}, 0x9}, {{r1}, 0x81}]}) [ 515.626356] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:03:28 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:28 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan3\x00'}) 04:03:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 13) [ 515.743273] FAULT_INJECTION: forcing a failure. [ 515.743273] name failslab, interval 1, probability 0, space 0, times 0 [ 515.745811] CPU: 1 PID: 5727 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 515.747251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 515.749009] Call Trace: [ 515.749570] dump_stack+0x107/0x167 [ 515.750347] should_fail.cold+0x5/0xa [ 515.751154] ? create_object.isra.0+0x3a/0xa30 [ 515.752119] should_failslab+0x5/0x20 [ 515.752934] kmem_cache_alloc+0x5b/0x310 [ 515.753796] create_object.isra.0+0x3a/0xa30 [ 515.754726] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 515.755800] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 515.756873] ? netlbl_mgmt_version+0x7c/0x340 [ 515.757827] __alloc_skb+0xb1/0x5b0 [ 515.758602] netlbl_mgmt_version+0x7c/0x340 [ 515.759586] ? netlbl_mgmt_listall+0x250/0x250 [ 515.760560] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 515.761955] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 515.763334] genl_family_rcv_msg_doit+0x22d/0x330 [ 515.764355] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 515.765767] ? genl_op_from_small+0x23/0x3d0 [ 515.766694] ? genl_get_cmd+0x3cf/0x480 [ 515.767538] genl_rcv_msg+0x36a/0x5a0 04:03:28 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) [ 515.768351] ? genl_get_cmd+0x480/0x480 [ 515.769489] ? netlbl_mgmt_listall+0x250/0x250 [ 515.770470] ? lock_release+0x680/0x680 [ 515.771309] ? __lockdep_reset_lock+0x180/0x180 [ 515.772295] netlink_rcv_skb+0x14b/0x430 [ 515.773172] ? genl_get_cmd+0x480/0x480 [ 515.774016] ? netlink_ack+0xab0/0xab0 [ 515.774848] ? netlink_deliver_tap+0x1c4/0xcc0 [ 515.775809] ? is_vmalloc_addr+0x7b/0xb0 [ 515.776668] genl_rcv+0x24/0x40 [ 515.777371] netlink_unicast+0x6ce/0xa00 [ 515.778235] ? netlink_attachskb+0xab0/0xab0 [ 515.779176] netlink_sendmsg+0x90f/0xe00 [ 515.780032] ? netlink_unicast+0xa00/0xa00 [ 515.780915] ? netlink_unicast+0xa00/0xa00 [ 515.781820] __sock_sendmsg+0x154/0x190 [ 515.782674] ____sys_sendmsg+0x70d/0x870 [ 515.783549] ? sock_write_iter+0x3d0/0x3d0 [ 515.784442] ? do_recvmmsg+0x6d0/0x6d0 [ 515.785283] ? SOFTIRQ_verbose+0x10/0x10 [ 515.786151] ? lock_downgrade+0x6d0/0x6d0 [ 515.787036] ? __lockdep_reset_lock+0x180/0x180 [ 515.788024] ? SOFTIRQ_verbose+0x10/0x10 [ 515.788897] ___sys_sendmsg+0xf3/0x170 [ 515.789729] ? sendmsg_copy_msghdr+0x160/0x160 [ 515.790705] ? __fget_files+0x2cf/0x520 [ 515.791555] ? lock_downgrade+0x6d0/0x6d0 [ 515.792434] ? find_held_lock+0x2c/0x110 [ 515.793322] ? __fget_files+0x2f8/0x520 [ 515.794172] ? __fget_light+0xea/0x290 [ 515.795009] __sys_sendmsg+0xe5/0x1b0 [ 515.795816] ? __sys_sendmsg_sock+0x40/0x40 [ 515.796737] ? rcu_read_lock_any_held+0x75/0xa0 [ 515.797755] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 515.798868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 515.799958] ? trace_hardirqs_on+0x5b/0x180 [ 515.800889] do_syscall_64+0x33/0x40 [ 515.801688] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 515.802774] RIP: 0033:0x7feff7241b19 [ 515.803564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 515.807452] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 515.809065] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 515.810568] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 515.812082] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 515.813583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 515.815088] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 515.837777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5705 comm=syz-executor.6 04:03:28 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) 04:03:28 executing program 2: keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000040)=""/37, 0x25) keyctl$get_keyring_id(0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000004c0), 0x0, 0x0, 0x0, r0) r1 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000300)='user\x00', 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)={0x2, 0x0, @auto=[0x1d, 0x13, 0x33]}, 0xb, r1) keyctl$read(0xb, r0, &(0x7f0000000400)=""/35, 0x37) timer_create(0x3, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000004c0), 0x0, 0x0, 0x0, r2) keyctl$read(0xb, r2, &(0x7f0000000a80)=""/4096, 0x1000) timer_create(0x5, &(0x7f0000000080)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000100)="d8b243238323e85e03da6f5df53ca1ae3375c8561052072b202407b387069b61af539ede5dd2e0e31d66f4db0df9c9e1ec3573ab5c54365fcd3fe933d6e502d1957522f813bf16041285eb1ed667a750bd08f15b3761c756679f77403c48732b6120292a8d0c859a78774518cd4912c51f69b6d1b0e7b11e5d75009015114b1b004d455c769bb19d65d49bdb", &(0x7f00000004c0)="e6"}}, &(0x7f0000000a00)=0x0) keyctl$read(0xb, 0x0, &(0x7f0000000240)=""/164, 0xa4) timer_gettime(r3, &(0x7f0000000a40)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x405d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 516.042455] loop7: detected capacity change from 0 to 16776704 [ 516.130445] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 516.130445] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 516.130445] [ 516.184226] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:03:42 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 04:03:42 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:03:42 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:03:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 14) 04:03:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x58041, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@local, @ipv4={'\x00', '\xff\xff', @local}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfffffffd, 0x401, 0xfffa, 0x0, 0x7fffffff, 0x40}) 04:03:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f0000000180)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3af, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 04:03:42 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:42 executing program 6: ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000100)={&(0x7f0000000180)=""/147, 0x93}) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r0, r2) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005980)=[{{&(0x7f00000016c0)=@abs, 0x6e, &(0x7f0000001980)=[{&(0x7f0000001740)=""/109, 0x6d}, {&(0x7f00000017c0)=""/103, 0x67}, {&(0x7f0000001840)=""/20, 0x14}, {&(0x7f0000001880)=""/205, 0xcd}], 0x4, &(0x7f00000019c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000001a00)=@abs, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001a80)=""/60, 0x3c}, {&(0x7f0000001ac0)=""/63, 0x3f}, {&(0x7f0000001b00)}], 0x3, &(0x7f0000001b80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000001c80)=""/66, 0x42}, {&(0x7f0000001d00)=""/238, 0xee}, {&(0x7f0000001e00)=""/159, 0x9f}, {&(0x7f0000001ec0)=""/81, 0x51}, {&(0x7f0000001f40)=""/4096, 0x1000}], 0x5, &(0x7f0000002fc0)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f00000041c0)=[{&(0x7f0000003000)=""/9, 0x9}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/131, 0x83}, {&(0x7f0000004100)=""/175, 0xaf}], 0x4, &(0x7f0000004200)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000004240)=@abs, 0x6e, &(0x7f0000005780)=[{&(0x7f00000042c0)=""/252, 0xfc}, {&(0x7f00000043c0)=""/44, 0x2c}, {&(0x7f0000004400)=""/4096, 0x1000}, {&(0x7f0000005400)=""/207, 0xcf}, {&(0x7f0000005500)}, {&(0x7f0000005540)=""/234, 0xea}, {&(0x7f0000005640)=""/16, 0x10}, {&(0x7f0000005680)=""/230, 0xe6}], 0x8, &(0x7f0000005800)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000005840), 0x6e, &(0x7f0000005900)=[{&(0x7f00000058c0)=""/34, 0x22}], 0x1, &(0x7f0000005940)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}], 0x6, 0x40, &(0x7f0000005b00)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006a00)=[{{&(0x7f0000005b40)=@abs, 0x6e, &(0x7f0000005d40)=[{&(0x7f0000005bc0)=""/122, 0x7a}, {&(0x7f0000005c40)=""/211, 0xd3}], 0x2, &(0x7f0000005d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000005e80), 0x6e, &(0x7f0000006440)=[{&(0x7f0000005f00)=""/190, 0xbe}, {&(0x7f0000005fc0)=""/170, 0xaa}, {&(0x7f0000006080)=""/57, 0x39}, {&(0x7f00000060c0)=""/63, 0x3f}, {&(0x7f0000006100)=""/20, 0x14}, {&(0x7f0000006140)=""/106, 0x6a}, {&(0x7f00000061c0)=""/208, 0xd0}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/232, 0xe8}], 0x9, &(0x7f0000006500)}}, {{0x0, 0x0, &(0x7f0000006780)=[{&(0x7f0000006540)=""/115, 0x73}, {&(0x7f00000065c0)=""/125, 0x7d}, {&(0x7f0000006640)=""/158, 0x9e}, {&(0x7f0000006700)=""/105, 0x69}], 0x4, &(0x7f00000067c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f00000069c0)=[{&(0x7f0000006800)=""/196, 0xc4}, {&(0x7f0000006900)=""/189, 0xbd}], 0x2}}], 0x4, 0x2043, &(0x7f0000006b00)={0x0, 0x3938700}) r5 = fork() ptrace$getsig(0x4202, r5, 0x2, &(0x7f0000000240)) getpgrp(r5) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r7, r6, 0x0) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r9, r8, 0x0) poll(&(0x7f0000000040)=[{r8}], 0x1, 0x0) pipe2(&(0x7f0000006b40)={0xffffffffffffffff}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000006c40)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001500)=[{&(0x7f00000000c0)="6f9e5ec8edb55a747d8c4d1b4c1f744e593421e0d95dc5a965505e18a40b3d1ff0c053857ce2313604ac1fdc2df2daf95e9f5154c6abb0100cc46e7bc48269eb2924f80e0093501c821142119f52b805dc39a1f9cbff9f362b842a5f498e78ad9374284f8a33447812562abe2361aec2e79b086b589593740eea7a2cb1a69831ae09cd45a5a0e3875784777796471476c09e189d43c329d1fe56cbf2", 0x9c}, {&(0x7f0000000180)="f59de893c3cc030503b8c3d9681bc134ecf813866f244cfc787e30a13ff7acc363f261", 0x23}, {&(0x7f00000001c0)="e4506da9c3ac04baeb25b5c2cc1e1f660e7e6b368944729cceab8a7cbd6c1377cd6363b9754e2d760576d83d8fcb2337f690a4cd902fbc7e825c25978533d48247ecae604242ea42cb7417019f0e6aeb530a3af2e5c19588f0667780d3fd1856", 0x60}, {&(0x7f0000000280)="19d18038ea49dcc64f8fe00674a948fa88fa62117f9f5bf148f446a21a3dd38581de3db07e225e959b5f1729938dfaf362e8605cdb90b921d709262c09714e8174e8034e08c811fa955d34683eb6de8b097d21fd8abcf60627b6c00176b1e4a8137f8f3b85497f81f3a7c363ee1366b09e7638b84a1cc1dc0ec91227fdeb66934aa9153c011acdb818ed8c4daf04637692f948174210c121d29de71e82d75daad8cec01eb6800b4144a01c00e97fca422ed065a417f606b2", 0xb8}, {&(0x7f0000000340)="f4302e23cc8849f81a3d9d59aa4d77c8bfdce112be808f117778fbcd7edbecf07d57cf1bce9b8f7beba842a377ef9992efa74ba5b8605743a3afa6731fdf84654b21cbe0b1503977564ba3e7d3f8eca029237ca31d34325abb78449f2ef0b4828ae6259d775c953399707ab493be5307759115890e79b2531a1afcbece33fa2804deee027780af03ac7b4fde1356f9eaff89cf1bb3d2d300a85946e801bae9e2b14b70ece238285a4ff064b654a6780b86ad27c1f16c82fa53bdee34a9a5ebb5c3f63f30e9c1e188d80a03219d16b0", 0xcf}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="3f541ca111e15cca6359206a4f8f9d01b4714bddb44b04cd12a3941395914df96485ded24dadad25d1a51ed9f8ed92335c09b53c3a87a7d2be2105846f11bcab1a879f593ae244e1b789463650ab4f0739a1b12ed1cc3dfc676fca6a08e084f31897a38d3b2dc31cab1b5f87c3c504c10f94885cdd205c1c76559be72685fbf88bd2ffcc3d54592d8949be5b7400131b2b3e5ab2bdae2453f080aa", 0x9b}], 0x7, &(0x7f0000006b80)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r2}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [r6, 0xffffffffffffffff, r8, r10]}}], 0xc0, 0x4000}, 0x4040000) clock_gettime(0x5, &(0x7f0000000240)) [ 529.449115] loop7: detected capacity change from 0 to 16776704 [ 529.456225] FAULT_INJECTION: forcing a failure. [ 529.456225] name failslab, interval 1, probability 0, space 0, times 0 [ 529.458987] CPU: 0 PID: 5768 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 529.460476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 529.462301] Call Trace: [ 529.462875] dump_stack+0x107/0x167 [ 529.463669] should_fail.cold+0x5/0xa [ 529.464503] should_failslab+0x5/0x20 [ 529.464808] loop3: detected capacity change from 0 to 16776704 [ 529.465343] __kmalloc_node_track_caller+0x74/0x3b0 [ 529.467221] ? netlink_trim+0x1ee/0x250 [ 529.468093] pskb_expand_head+0x15a/0x1040 [ 529.469032] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 529.470185] netlink_trim+0x1ee/0x250 [ 529.470360] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 529.470360] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 529.470360] [ 529.471016] netlink_unicast+0xb8/0xa00 [ 529.471036] ? skb_put+0x134/0x180 [ 529.471053] ? skb_put+0x134/0x180 [ 529.471078] ? netlink_attachskb+0xab0/0xab0 [ 529.471098] ? memcpy+0x39/0x60 [ 529.471128] netlbl_mgmt_version+0x2ad/0x340 [ 529.471150] ? netlbl_mgmt_listall+0x250/0x250 [ 529.471178] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 529.480519] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 529.481956] genl_family_rcv_msg_doit+0x22d/0x330 [ 529.483009] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 529.484463] ? genl_op_from_small+0x23/0x3d0 [ 529.485428] ? genl_get_cmd+0x3cf/0x480 [ 529.486302] genl_rcv_msg+0x36a/0x5a0 [ 529.487138] ? genl_get_cmd+0x480/0x480 [ 529.488011] ? netlbl_mgmt_listall+0x250/0x250 [ 529.489023] ? lock_release+0x680/0x680 [ 529.489891] ? __lockdep_reset_lock+0x180/0x180 [ 529.490912] netlink_rcv_skb+0x14b/0x430 [ 529.491800] ? genl_get_cmd+0x480/0x480 [ 529.492668] ? netlink_ack+0xab0/0xab0 [ 529.493536] ? netlink_deliver_tap+0x1c4/0xcc0 [ 529.494528] ? is_vmalloc_addr+0x7b/0xb0 [ 529.495417] genl_rcv+0x24/0x40 [ 529.496129] netlink_unicast+0x6ce/0xa00 [ 529.497031] ? netlink_attachskb+0xab0/0xab0 [ 529.498006] netlink_sendmsg+0x90f/0xe00 [ 529.498901] ? netlink_unicast+0xa00/0xa00 [ 529.499840] ? netlink_unicast+0xa00/0xa00 [ 529.500764] __sock_sendmsg+0x154/0x190 [ 529.501636] ____sys_sendmsg+0x70d/0x870 [ 529.502525] ? sock_write_iter+0x3d0/0x3d0 [ 529.503440] ? do_recvmmsg+0x6d0/0x6d0 [ 529.504293] ? SOFTIRQ_verbose+0x10/0x10 [ 529.505181] ? lock_downgrade+0x6d0/0x6d0 [ 529.506085] ? __lockdep_reset_lock+0x180/0x180 [ 529.507096] ? SOFTIRQ_verbose+0x10/0x10 [ 529.507981] ___sys_sendmsg+0xf3/0x170 [ 529.508830] ? sendmsg_copy_msghdr+0x160/0x160 [ 529.509838] ? __fget_files+0x2cf/0x520 [ 529.510706] ? lock_downgrade+0x6d0/0x6d0 [ 529.511610] ? find_held_lock+0x2c/0x110 [ 529.512509] ? __fget_files+0x2f8/0x520 [ 529.513401] ? __fget_light+0xea/0x290 [ 529.514257] __sys_sendmsg+0xe5/0x1b0 [ 529.515084] ? __sys_sendmsg_sock+0x40/0x40 [ 529.516020] ? rcu_read_lock_any_held+0x75/0xa0 [ 529.517067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 529.518208] ? syscall_enter_from_user_mode+0x1d/0x50 [ 529.519323] ? trace_hardirqs_on+0x5b/0x180 [ 529.520265] do_syscall_64+0x33/0x40 [ 529.521085] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 529.522204] RIP: 0033:0x7feff7241b19 [ 529.523008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.527045] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 529.528721] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 529.530297] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 529.531857] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 529.533425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 529.534996] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 529.541317] kauditd_printk_skb: 139 callbacks suppressed [ 529.541335] audit: type=1326 audit(1766462622.419:500): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.555838] audit: type=1326 audit(1766462622.419:501): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 15) [ 529.589435] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 529.589435] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 529.589435] [ 529.601505] audit: type=1326 audit(1766462622.454:502): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.606736] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 529.612936] audit: type=1326 audit(1766462622.454:503): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.617919] audit: type=1326 audit(1766462622.454:504): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.624053] audit: type=1326 audit(1766462622.466:505): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.627460] audit: type=1326 audit(1766462622.466:506): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.633029] audit: type=1326 audit(1766462622.466:507): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.640155] audit: type=1326 audit(1766462622.474:508): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 529.642946] audit: type=1326 audit(1766462622.475:509): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5769 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:42 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 529.752003] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 529.787552] FAULT_INJECTION: forcing a failure. [ 529.787552] name failslab, interval 1, probability 0, space 0, times 0 [ 529.789371] CPU: 1 PID: 5802 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 529.790174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 529.791171] Call Trace: [ 529.791574] dump_stack+0x107/0x167 [ 529.791997] should_fail.cold+0x5/0xa [ 529.792438] ? create_object.isra.0+0x3a/0xa30 [ 529.792970] should_failslab+0x5/0x20 [ 529.793413] kmem_cache_alloc+0x5b/0x310 [ 529.793891] create_object.isra.0+0x3a/0xa30 [ 529.794415] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 529.795119] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 529.795897] ? netlink_trim+0x1ee/0x250 [ 529.796470] pskb_expand_head+0x15a/0x1040 [ 529.796965] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 529.797588] netlink_trim+0x1ee/0x250 [ 529.798028] netlink_unicast+0xb8/0xa00 [ 529.798483] ? skb_put+0x134/0x180 [ 529.798888] ? skb_put+0x134/0x180 [ 529.799303] ? netlink_attachskb+0xab0/0xab0 [ 529.799817] ? memcpy+0x39/0x60 [ 529.800298] netlbl_mgmt_version+0x2ad/0x340 [ 529.800869] ? netlbl_mgmt_listall+0x250/0x250 [ 529.801407] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 529.802406] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 529.803356] genl_family_rcv_msg_doit+0x22d/0x330 [ 529.804069] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 529.804885] ? genl_op_from_small+0x23/0x3d0 [ 529.805402] ? genl_get_cmd+0x3cf/0x480 [ 529.805878] genl_rcv_msg+0x36a/0x5a0 [ 529.806413] ? genl_get_cmd+0x480/0x480 [ 529.806937] ? netlbl_mgmt_listall+0x250/0x250 [ 529.807465] ? lock_release+0x680/0x680 [ 529.807928] ? __lockdep_reset_lock+0x180/0x180 [ 529.808471] netlink_rcv_skb+0x14b/0x430 [ 529.809085] ? genl_get_cmd+0x480/0x480 [ 529.809635] ? netlink_ack+0xab0/0xab0 [ 529.810198] ? netlink_deliver_tap+0x1c4/0xcc0 [ 529.810843] ? is_vmalloc_addr+0x7b/0xb0 [ 529.811317] genl_rcv+0x24/0x40 [ 529.811700] netlink_unicast+0x6ce/0xa00 [ 529.812174] ? netlink_attachskb+0xab0/0xab0 [ 529.812691] netlink_sendmsg+0x90f/0xe00 [ 529.813175] ? netlink_unicast+0xa00/0xa00 [ 529.813668] ? netlink_unicast+0xa00/0xa00 [ 529.814155] __sock_sendmsg+0x154/0x190 [ 529.814620] ____sys_sendmsg+0x70d/0x870 [ 529.815115] ? sock_write_iter+0x3d0/0x3d0 [ 529.815710] ? do_recvmmsg+0x6d0/0x6d0 [ 529.816165] ? SOFTIRQ_verbose+0x10/0x10 [ 529.816678] ? lock_downgrade+0x6d0/0x6d0 [ 529.817251] ? __lockdep_reset_lock+0x180/0x180 [ 529.817858] ? SOFTIRQ_verbose+0x10/0x10 [ 529.818469] ___sys_sendmsg+0xf3/0x170 [ 529.819005] ? sendmsg_copy_msghdr+0x160/0x160 [ 529.819538] ? __fget_files+0x2cf/0x520 [ 529.820003] ? lock_downgrade+0x6d0/0x6d0 [ 529.820479] ? find_held_lock+0x2c/0x110 [ 529.820965] ? __fget_files+0x2f8/0x520 [ 529.821455] ? __fget_light+0xea/0x290 [ 529.822025] __sys_sendmsg+0xe5/0x1b0 [ 529.822463] ? __sys_sendmsg_sock+0x40/0x40 [ 529.822960] ? rcu_read_lock_any_held+0x75/0xa0 [ 529.823515] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 529.824126] ? syscall_enter_from_user_mode+0x1d/0x50 [ 529.824847] ? trace_hardirqs_on+0x5b/0x180 [ 529.825427] do_syscall_64+0x33/0x40 [ 529.826005] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 529.826734] RIP: 0033:0x7feff7241b19 [ 529.827230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 529.829535] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 529.830425] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 529.831389] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 529.832373] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 529.833366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 529.834197] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 04:03:42 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:03:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 04:03:42 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:42 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) [ 529.943880] loop3: detected capacity change from 0 to 16776704 [ 529.953990] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 529.953990] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 529.953990] [ 529.968739] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:03:58 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:03:58 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:03:58 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 04:03:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 16) 04:03:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) creat(&(0x7f0000000040)='./file0\x00', 0x0) 04:03:58 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:03:58 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:03:58 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 545.320279] FAULT_INJECTION: forcing a failure. [ 545.320279] name failslab, interval 1, probability 0, space 0, times 0 [ 545.322705] CPU: 1 PID: 5828 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 545.324152] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 545.325929] Call Trace: [ 545.326492] dump_stack+0x107/0x167 [ 545.327273] should_fail.cold+0x5/0xa [ 545.328087] ? create_object.isra.0+0x3a/0xa30 [ 545.329051] should_failslab+0x5/0x20 [ 545.329869] kmem_cache_alloc+0x5b/0x310 [ 545.330742] create_object.isra.0+0x3a/0xa30 [ 545.331674] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 545.332756] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 545.333844] ? netlink_trim+0x1ee/0x250 [ 545.334702] pskb_expand_head+0x15a/0x1040 [ 545.335599] ? __kmalloc_node_track_caller+0x1a6/0x3b0 [ 545.336717] netlink_trim+0x1ee/0x250 [ 545.337532] netlink_unicast+0xb8/0xa00 [ 545.338369] ? skb_put+0x134/0x180 [ 545.339122] ? skb_put+0x134/0x180 [ 545.339878] ? netlink_attachskb+0xab0/0xab0 [ 545.340804] ? memcpy+0x39/0x60 [ 545.341520] netlbl_mgmt_version+0x2ad/0x340 [ 545.342448] ? netlbl_mgmt_listall+0x250/0x250 [ 545.343414] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 545.344807] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 545.346197] genl_family_rcv_msg_doit+0x22d/0x330 [ 545.347228] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 545.348632] ? genl_op_from_small+0x23/0x3d0 [ 545.349570] ? genl_get_cmd+0x3cf/0x480 [ 545.350423] genl_rcv_msg+0x36a/0x5a0 [ 545.351241] ? genl_get_cmd+0x480/0x480 [ 545.352079] ? netlbl_mgmt_listall+0x250/0x250 [ 545.353054] ? lock_release+0x680/0x680 [ 545.353905] ? __lockdep_reset_lock+0x180/0x180 [ 545.354896] netlink_rcv_skb+0x14b/0x430 [ 545.355755] ? genl_get_cmd+0x480/0x480 [ 545.356605] ? netlink_ack+0xab0/0xab0 [ 545.357448] ? netlink_deliver_tap+0x1c4/0xcc0 [ 545.358413] ? is_vmalloc_addr+0x7b/0xb0 [ 545.359280] genl_rcv+0x24/0x40 [ 545.359977] netlink_unicast+0x6ce/0xa00 [ 545.360844] ? netlink_attachskb+0xab0/0xab0 [ 545.361808] netlink_sendmsg+0x90f/0xe00 [ 545.362684] ? netlink_unicast+0xa00/0xa00 [ 545.363598] ? netlink_unicast+0xa00/0xa00 [ 545.364499] __sock_sendmsg+0x154/0x190 [ 545.365348] ____sys_sendmsg+0x70d/0x870 [ 545.366211] ? sock_write_iter+0x3d0/0x3d0 [ 545.367108] ? do_recvmmsg+0x6d0/0x6d0 [ 545.367938] ? SOFTIRQ_verbose+0x10/0x10 [ 545.368793] ? lock_downgrade+0x6d0/0x6d0 [ 545.369692] ? __lockdep_reset_lock+0x180/0x180 [ 545.370663] ? SOFTIRQ_verbose+0x10/0x10 [ 545.371518] ___sys_sendmsg+0xf3/0x170 [ 545.372341] ? sendmsg_copy_msghdr+0x160/0x160 [ 545.373321] ? __fget_files+0x2cf/0x520 [ 545.374159] ? lock_downgrade+0x6d0/0x6d0 [ 545.375038] ? find_held_lock+0x2c/0x110 [ 545.375911] ? __fget_files+0x2f8/0x520 [ 545.376762] ? __fget_light+0xea/0x290 [ 545.377599] __sys_sendmsg+0xe5/0x1b0 [ 545.378398] ? __sys_sendmsg_sock+0x40/0x40 [ 545.379305] ? rcu_read_lock_any_held+0x75/0xa0 [ 545.380309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 545.381429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 545.382510] ? trace_hardirqs_on+0x5b/0x180 [ 545.383424] do_syscall_64+0x33/0x40 [ 545.384207] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 545.385291] RIP: 0033:0x7feff7241b19 [ 545.386075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 545.389955] RSP: 002b:00007feff47b7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 545.391559] RAX: ffffffffffffffda RBX: 00007feff7354f60 RCX: 00007feff7241b19 [ 545.393064] RDX: 0000000000000000 RSI: 0000000020000840 RDI: 0000000000000004 [ 545.394573] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.396060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 545.397562] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 545.413393] loop7: detected capacity change from 0 to 16776704 [ 545.428142] loop6: detected capacity change from 0 to 16776704 [ 545.441585] kauditd_printk_skb: 62 callbacks suppressed [ 545.442868] audit: type=1326 audit(1766462638.319:572): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.451738] audit: type=1326 audit(1766462638.320:573): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) (fail_nth: 17) [ 545.479838] loop3: detected capacity change from 0 to 16776704 [ 545.493582] audit: type=1326 audit(1766462638.329:574): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.500198] audit: type=1326 audit(1766462638.330:575): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.514572] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 545.514572] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 545.514572] 04:03:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f00000000c0)={r3, 0x1, 0xc500, 0x1}) 04:03:58 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r2 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 545.548344] loop2: detected capacity change from 0 to 16776704 [ 545.548470] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 545.559894] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 545.559894] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 545.559894] [ 545.584900] audit: type=1326 audit(1766462638.330:576): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.618281] audit: type=1326 audit(1766462638.330:577): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.626575] FAULT_INJECTION: forcing a failure. [ 545.626575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 545.628276] CPU: 0 PID: 5873 Comm: syz-executor.4 Not tainted 5.10.247 #1 [ 545.629100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 545.630115] Call Trace: [ 545.630440] dump_stack+0x107/0x167 [ 545.630884] should_fail.cold+0x5/0xa [ 545.631351] _copy_from_user+0x2e/0x1b0 [ 545.631835] kstrtouint_from_user+0xbd/0x220 [ 545.632365] ? kstrtou8_from_user+0x210/0x210 [ 545.632910] ? lock_acquire+0x197/0x470 [ 545.633394] ? ksys_write+0x12d/0x260 [ 545.633867] proc_fail_nth_write+0x78/0x220 [ 545.634385] ? proc_task_getattr+0x1f0/0x1f0 [ 545.634927] ? proc_task_getattr+0x1f0/0x1f0 [ 545.635456] vfs_write+0x29a/0xb10 [ 545.635890] ksys_write+0x12d/0x260 [ 545.636330] ? __ia32_sys_read+0xb0/0xb0 [ 545.636822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 545.637463] ? syscall_enter_from_user_mode+0x1d/0x50 [ 545.638088] do_syscall_64+0x33/0x40 [ 545.638536] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 545.639146] RIP: 0033:0x7feff71f45ff [ 545.639606] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 545.641791] RSP: 002b:00007feff47b7170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 545.642702] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feff71f45ff [ 545.643547] RDX: 0000000000000001 RSI: 00007feff47b71e0 RDI: 0000000000000003 [ 545.644393] RBP: 00007feff47b71d0 R08: 0000000000000000 R09: 0000000000000000 [ 545.645254] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 545.646106] R13: 00007ffc22e96b4f R14: 00007feff47b7300 R15: 0000000000022000 [ 545.671761] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 545.677471] audit: type=1326 audit(1766462638.332:578): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.681646] audit: type=1326 audit(1766462638.332:579): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.686419] audit: type=1326 audit(1766462638.332:580): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 545.702825] audit: type=1326 audit(1766462638.332:581): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5831 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:03:58 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 545.852485] loop7: detected capacity change from 0 to 16776704 [ 545.868883] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 545.868883] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 545.868883] [ 545.882313] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:12 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) 04:04:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r3, "ce6e765f732580663ee20319cf5555dd"}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="0000b101", @ANYRESDEC=r3, @ANYBLOB=':18446744073709551609P']) 04:04:12 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) 04:04:12 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:04:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:12 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:12 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) 04:04:12 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) [ 559.206080] loop7: detected capacity change from 0 to 16776704 [ 559.225486] kauditd_printk_skb: 55 callbacks suppressed [ 559.225508] audit: type=1326 audit(1766462652.103:637): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.239282] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 559.239282] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.239282] [ 559.241305] audit: type=1326 audit(1766462652.103:638): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.254851] loop3: detected capacity change from 0 to 16776704 [ 559.271495] loop6: detected capacity change from 0 to 16776704 [ 559.277424] audit: type=1326 audit(1766462652.129:639): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.282238] audit: type=1326 audit(1766462652.129:640): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.283898] loop2: detected capacity change from 0 to 16776704 [ 559.287509] audit: type=1326 audit(1766462652.129:641): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.292762] audit: type=1326 audit(1766462652.130:642): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.298003] audit: type=1326 audit(1766462652.130:643): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.303384] audit: type=1326 audit(1766462652.132:644): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.308557] audit: type=1326 audit(1766462652.133:645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.313305] audit: type=1326 audit(1766462652.134:646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5895 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 559.321998] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 559.321998] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.321998] [ 559.327130] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 559.327130] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.327130] [ 559.329932] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 559.358025] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 559.358025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.358025] [ 559.368296] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:12 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:04:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 559.375199] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:12 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r2, 0x5, 0x8}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000880)={r2, "ce6e765f732580663ee20319cf5555dd"}) [ 559.459120] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r2, 0x5, 0x8}) 04:04:12 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:04:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:12 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:04:12 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:04:12 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:04:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) [ 559.809288] loop3: detected capacity change from 0 to 16776704 04:04:12 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000440)={0x4}) [ 559.847263] loop6: detected capacity change from 0 to 16776704 [ 559.866579] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 559.866579] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.866579] 04:04:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x3, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:12 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) [ 559.905932] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 559.905932] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 559.905932] [ 559.948561] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 559.972229] loop7: detected capacity change from 0 to 16776704 [ 560.008945] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 560.008945] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 560.008945] [ 560.015104] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x8, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) syz_io_uring_setup(0x9, &(0x7f00000004c0)={0x0, 0x355a, 0x0, 0xfffffffd, 0x3b0, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 560.091232] loop2: detected capacity change from 0 to 16776704 04:04:13 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 560.156481] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 560.231344] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 560.231344] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 560.231344] [ 560.344047] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x9, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:28 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:04:28 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 04:04:28 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:04:28 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:28 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:04:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 04:04:28 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 575.481881] loop7: detected capacity change from 0 to 16776704 [ 575.496018] loop2: detected capacity change from 0 to 16776704 [ 575.499894] kauditd_printk_skb: 100 callbacks suppressed [ 575.499913] audit: type=1326 audit(1766462668.377:747): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.505844] audit: type=1326 audit(1766462668.378:748): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.530840] audit: type=1326 audit(1766462668.391:749): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.535329] loop3: detected capacity change from 0 to 16776704 [ 575.546025] loop6: detected capacity change from 0 to 16776704 [ 575.554819] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 575.554819] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 575.554819] [ 575.556819] audit: type=1326 audit(1766462668.391:750): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.566124] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 575.566124] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 575.566124] [ 575.585588] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 575.585588] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 575.585588] [ 575.586772] audit: type=1326 audit(1766462668.391:751): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:04:28 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xf, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 575.627376] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 575.627376] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 575.627376] 04:04:28 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 575.643206] audit: type=1326 audit(1766462668.395:752): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.650439] audit: type=1326 audit(1766462668.395:753): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.655305] audit: type=1326 audit(1766462668.395:754): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.660028] audit: type=1326 audit(1766462668.395:755): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.676070] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 575.692015] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 575.697790] audit: type=1326 audit(1766462668.396:756): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6011 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 575.705953] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 575.721558] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:43 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 590.316999] kauditd_printk_skb: 15 callbacks suppressed [ 590.317015] audit: type=1326 audit(1766462683.195:772): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.324063] audit: type=1326 audit(1766462683.201:773): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.340023] audit: type=1326 audit(1766462683.201:774): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.350140] loop2: detected capacity change from 0 to 16776704 04:04:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) 04:04:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x60, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:43 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:04:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:04:43 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:04:43 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 590.368809] audit: type=1326 audit(1766462683.201:775): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.379121] loop3: detected capacity change from 0 to 16776704 [ 590.388068] loop6: detected capacity change from 0 to 16776704 [ 590.393777] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 590.393777] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 590.393777] [ 590.398537] loop7: detected capacity change from 0 to 16776704 [ 590.414038] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 590.414038] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 590.414038] 04:04:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x300, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) [ 590.442453] audit: type=1326 audit(1766462683.207:776): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.464020] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 590.492805] audit: type=1326 audit(1766462683.207:777): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6058 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.520864] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 590.520864] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 590.520864] 04:04:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x900, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:43 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) [ 590.554447] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 590.568557] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 590.568557] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 590.568557] [ 590.588301] audit: type=1326 audit(1766462683.466:778): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.593743] audit: type=1326 audit(1766462683.466:779): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.611225] audit: type=1326 audit(1766462683.466:780): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 590.635092] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) [ 590.683230] audit: type=1326 audit(1766462683.469:781): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6100 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:04:43 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 590.712182] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) 04:04:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xf00, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:04:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:04:43 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) [ 590.882846] loop3: detected capacity change from 0 to 16776704 04:04:43 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:04:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) [ 590.945453] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 590.945453] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 590.945453] [ 591.010126] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:58 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) 04:04:58 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) [ 605.717868] loop2: detected capacity change from 0 to 16776704 [ 605.731920] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 605.731920] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 605.731920] 04:04:58 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:04:58 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:04:58 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:04:58 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:04:58 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:04:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x6000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 605.778901] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 605.779873] loop6: detected capacity change from 0 to 16776704 [ 605.796401] loop7: detected capacity change from 0 to 16776704 04:04:58 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 605.825425] loop3: detected capacity change from 0 to 16776704 [ 605.860384] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 605.860384] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 605.860384] 04:04:58 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 605.904297] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 605.904297] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 605.904297] 04:04:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x30000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 605.915973] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 605.915973] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 605.915973] [ 605.970476] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 605.977234] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:58 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 606.075069] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:04:58 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:04:59 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) [ 606.256220] loop3: detected capacity change from 0 to 16776704 [ 606.278015] loop2: detected capacity change from 0 to 16776704 [ 606.305116] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 606.305116] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 606.305116] [ 606.310204] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 606.310204] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 606.310204] [ 606.326563] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 606.353286] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 621.075144] loop3: detected capacity change from 0 to 16776704 04:05:13 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:13 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:05:13 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:05:13 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:13 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:13 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:05:13 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x80000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:05:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 621.108899] loop7: detected capacity change from 0 to 16776704 [ 621.131329] loop2: detected capacity change from 0 to 16776704 [ 621.137772] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 621.137772] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 621.137772] [ 621.143115] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 621.143115] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 621.143115] 04:05:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 621.154965] loop6: detected capacity change from 0 to 16776704 [ 621.160396] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 621.160396] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 621.160396] [ 621.173000] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 621.173000] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 621.173000] [ 621.202425] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 621.204194] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 621.212963] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 621.239332] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:30 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x1000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:05:30 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:05:30 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:30 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:30 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 637.200985] loop2: detected capacity change from 0 to 16776704 04:05:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:30 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) [ 637.225293] loop7: detected capacity change from 0 to 16776704 [ 637.235118] loop6: detected capacity change from 0 to 16776704 [ 637.245428] loop3: detected capacity change from 0 to 16776704 [ 637.250077] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 637.250077] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.250077] 04:05:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 637.255199] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 637.255199] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.255199] 04:05:30 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:05:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x2000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:05:30 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 637.314234] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 637.314234] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.314234] [ 637.330104] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 637.330104] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.330104] [ 637.332337] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 637.353102] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 637.387225] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:30 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:30 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 637.457037] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 637.499309] loop3: detected capacity change from 0 to 16776704 [ 637.508514] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 637.508514] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.508514] [ 637.523926] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 637.618138] loop7: detected capacity change from 0 to 16776704 [ 637.645874] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 637.645874] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 637.645874] [ 637.675217] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:43 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:43 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:05:43 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:43 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:05:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:05:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x3000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 650.713257] loop2: detected capacity change from 0 to 16776704 [ 650.727439] loop7: detected capacity change from 0 to 16776704 [ 650.735955] loop6: detected capacity change from 0 to 16776704 [ 650.743847] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 650.743847] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.743847] 04:05:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 650.761062] loop3: detected capacity change from 0 to 16776704 [ 650.771781] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 650.771781] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.771781] [ 650.783739] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 650.785056] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 650.785056] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.785056] [ 650.803953] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 650.803953] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.803953] [ 650.814581] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:05:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x9000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:05:43 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 650.880117] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 650.883440] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:05:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xf000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 650.925510] loop6: detected capacity change from 0 to 16776704 04:05:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 650.951811] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 650.951811] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.951811] 04:05:43 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:05:43 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:05:43 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 651.023359] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 651.089180] loop3: detected capacity change from 0 to 16776704 [ 651.102328] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 651.102328] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 651.102328] [ 651.118905] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 651.130462] loop7: detected capacity change from 0 to 16776704 [ 651.143172] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 651.143172] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 651.143172] [ 651.164044] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:00 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x60000000, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:06:00 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:00 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:00 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:06:00 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:06:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:06:00 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 667.738103] loop2: detected capacity change from 0 to 16776704 [ 667.766465] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 667.766465] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 667.766465] [ 667.793939] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 667.800465] loop3: detected capacity change from 0 to 16776704 [ 667.823442] loop7: detected capacity change from 0 to 16776704 04:06:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) [ 667.839021] loop6: detected capacity change from 0 to 16776704 04:06:00 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:00 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 667.904950] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 667.904950] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 667.904950] [ 667.916197] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 667.916197] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 667.916197] [ 667.933831] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 667.933831] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 667.933831] [ 667.949253] kauditd_printk_skb: 11 callbacks suppressed [ 667.949273] audit: type=1326 audit(1766462760.827:793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6409 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x0 [ 667.961982] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xfcffffff, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:06:00 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 667.970294] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:00 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 668.032508] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 668.070395] loop2: detected capacity change from 0 to 16776704 04:06:00 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xffffff7f, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:06:00 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 668.141978] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 668.141978] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 668.141978] 04:06:01 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:01 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 668.195327] loop7: detected capacity change from 0 to 16776704 04:06:01 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 668.291429] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 668.291429] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 668.291429] 04:06:01 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0xfffffffc, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 668.320960] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 668.327158] loop6: detected capacity change from 0 to 16776704 [ 668.353902] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 668.353902] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 668.353902] [ 668.373083] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:01 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:01 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 668.447341] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:06:17 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:06:17 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:17 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:17 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:06:17 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:17 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0xf, r1, 0x1}, 0x14}}, 0x0) [ 684.891673] audit: type=1326 audit(1766462777.769:794): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6463 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x0 [ 684.903514] loop7: detected capacity change from 0 to 16776704 [ 684.937207] loop2: detected capacity change from 0 to 16776704 [ 684.946126] loop6: detected capacity change from 0 to 16776704 [ 684.967222] loop3: detected capacity change from 0 to 16776704 [ 684.991826] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 684.991826] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 684.991826] [ 684.997990] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 684.997990] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 684.997990] [ 684.999183] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 684.999183] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 684.999183] [ 685.005065] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 685.005065] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 685.005065] [ 685.062557] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 685.064063] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 685.066457] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 685.071914] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:39 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:06:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 04:06:39 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:39 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:06:39 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0xc0, r1, 0x1}, 0x14}}, 0x0) 04:06:39 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 707.135432] loop7: detected capacity change from 0 to 16776704 [ 707.157037] audit: type=1326 audit(1766462800.035:795): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6497 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x0 04:06:40 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:40 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 707.169025] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 707.169025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 707.169025] [ 707.172148] loop2: detected capacity change from 0 to 16776704 [ 707.190974] loop6: detected capacity change from 0 to 16776704 [ 707.205118] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 707.205118] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 707.205118] [ 707.218982] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 707.218982] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 707.218982] 04:06:40 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:40 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 707.238119] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 707.240437] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:40 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0xec0, r1, 0x1}, 0x14}}, 0x0) 04:06:40 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 707.306916] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:40 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:40 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:40 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:40 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x33fe0, r1, 0x1}, 0x14}}, 0x0) 04:06:40 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:06:54 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) 04:06:54 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:06:54 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:54 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:54 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x20000794, r1, 0x1}, 0x14}}, 0x0) 04:06:54 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:54 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 721.968158] loop3: detected capacity change from 0 to 16776704 [ 721.973468] audit: type=1326 audit(1766462814.851:796): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 721.982172] audit: type=1326 audit(1766462814.851:797): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 721.986307] loop6: detected capacity change from 0 to 16776704 [ 721.995873] audit: type=1326 audit(1766462814.860:798): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.001262] loop2: detected capacity change from 0 to 16776704 [ 722.007137] audit: type=1326 audit(1766462814.860:799): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.022955] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 722.022955] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 722.022955] [ 722.027891] audit: type=1326 audit(1766462814.860:800): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.034948] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 722.034948] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 722.034948] 04:06:54 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 722.044030] audit: type=1326 audit(1766462814.869:801): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:06:54 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x7ffff000, r1, 0x1}, 0x14}}, 0x0) [ 722.070076] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 722.070076] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 722.070076] [ 722.102484] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 722.104519] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 722.114277] audit: type=1326 audit(1766462814.870:802): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:06:54 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:06:55 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) [ 722.155651] audit: type=1326 audit(1766462814.870:803): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6561 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.169555] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:06:55 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 722.194853] audit: type=1326 audit(1766462815.066:804): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6588 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.227879] audit: type=1326 audit(1766462815.067:805): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6588 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 722.235455] loop2: detected capacity change from 0 to 16776704 [ 722.316478] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 722.316478] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 722.316478] [ 722.355505] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) 04:07:08 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:08 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x0, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:07:08 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:07:08 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0xfffffdef, r1, 0x1}, 0x14}}, 0x0) 04:07:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 735.534058] kauditd_printk_skb: 6 callbacks suppressed [ 735.534079] audit: type=1326 audit(1766462828.412:812): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.557364] loop3: detected capacity change from 0 to 16776704 04:07:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, 0x0) [ 735.560057] audit: type=1326 audit(1766462828.412:813): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.566989] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 735.566989] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.566989] [ 735.574155] loop7: detected capacity change from 0 to 16776704 [ 735.583077] loop2: detected capacity change from 0 to 16776704 [ 735.585897] audit: type=1326 audit(1766462828.412:814): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.591329] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 735.591329] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.591329] [ 735.595525] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue [ 735.599915] loop6: detected capacity change from 0 to 16776704 [ 735.606161] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 735.606161] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.606161] [ 735.608373] audit: type=1326 audit(1766462828.412:815): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.608527] audit: type=1326 audit(1766462828.413:816): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:07:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 735.631875] audit: type=1326 audit(1766462828.413:817): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.647798] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 735.649946] audit: type=1326 audit(1766462828.413:818): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.655177] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 735.655177] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.655177] 04:07:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x8}, 0x14}}, 0x0) [ 735.673345] audit: type=1326 audit(1766462828.413:819): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6613 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 04:07:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 735.692031] audit: type=1326 audit(1766462828.515:820): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6628 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.697811] audit: type=1326 audit(1766462828.516:821): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6628 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab9b8bab19 code=0x7ffc0000 [ 735.722903] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, 0x0) [ 735.738536] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:07:08 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:08 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, 0x0) 04:07:08 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 735.845154] loop3: detected capacity change from 0 to 16776704 04:07:08 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 735.918168] loop7: detected capacity change from 0 to 16776704 [ 735.930845] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 735.930845] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.930845] [ 735.951982] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue [ 735.981987] loop2: detected capacity change from 0 to 16776704 [ 735.996960] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 735.996960] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 735.996960] [ 736.008232] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:24 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:07:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x2}, 0x14}}, 0x0) 04:07:24 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:07:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 751.523054] loop7: detected capacity change from 0 to 16776704 [ 751.547727] loop3: detected capacity change from 0 to 16776704 [ 751.571082] loop6: detected capacity change from 0 to 16776704 [ 751.625940] loop2: detected capacity change from 0 to 16776704 [ 751.649418] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 751.649418] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 751.649418] 04:07:24 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 751.685156] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 751.685156] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 751.685156] 04:07:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x3}, 0x14}}, 0x0) 04:07:24 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 751.732880] loop3: detected capacity change from 0 to 16776704 [ 751.745206] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 751.781173] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:24 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x8}, 0x14}}, 0x0) 04:07:24 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 751.994081] loop6: detected capacity change from 0 to 16776704 [ 752.017232] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 752.017232] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 752.017232] [ 752.042136] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) 04:07:43 executing program 7: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x9}, 0x14}}, 0x0) 04:07:43 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 770.854015] loop3: detected capacity change from 0 to 16776704 [ 770.880503] loop2: detected capacity change from 0 to 16776704 [ 770.904002] loop7: detected capacity change from 0 to 16776704 04:07:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 770.941983] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 770.941983] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 770.941983] 04:07:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xf}, 0x14}}, 0x0) 04:07:43 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 771.050333] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:07:43 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:43 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x60}, 0x14}}, 0x0) 04:07:44 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) 04:07:44 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:07:44 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 771.314269] loop2: detected capacity change from 0 to 16776704 [ 771.355885] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 771.355885] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 771.355885] [ 771.394201] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:03 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, 0x0, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) 04:08:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x300}, 0x14}}, 0x0) 04:08:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 6: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 790.209127] loop6: detected capacity change from 0 to 16776704 [ 790.225497] loop2: detected capacity change from 0 to 16776704 [ 790.240725] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 790.240725] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 790.240725] [ 790.249032] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 790.249032] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 790.249032] 04:08:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 790.295210] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue [ 790.295513] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x900}, 0x14}}, 0x0) 04:08:03 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 790.451179] loop2: detected capacity change from 0 to 16776704 [ 790.483049] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 790.483049] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 790.483049] [ 790.513225] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:19 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xf00}, 0x14}}, 0x0) 04:08:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 806.622287] loop6: detected capacity change from 0 to 16776704 [ 806.634856] loop2: detected capacity change from 0 to 16776704 [ 806.643345] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 806.643345] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 806.643345] [ 806.673783] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 806.673783] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 806.673783] 04:08:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 806.699754] EXT4-fs (loop6): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:19 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 806.709388] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x6000}, 0x14}}, 0x0) 04:08:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:19 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:19 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 806.896837] loop2: detected capacity change from 0 to 16776704 [ 806.912924] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 806.912924] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 806.912924] [ 806.931148] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:36 executing program 2: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:36 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x30000}, 0x14}}, 0x0) 04:08:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 823.724966] loop6: detected capacity change from 0 to 16776704 04:08:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:08:36 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 823.784717] loop2: detected capacity change from 0 to 16776704 [ 823.837660] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 823.837660] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 823.837660] 04:08:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x80000}, 0x14}}, 0x0) 04:08:36 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 823.909655] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue [ 823.914181] loop6: detected capacity change from 0 to 16776704 04:08:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:08:36 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:36 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:08:36 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 824.082647] loop2: detected capacity change from 0 to 16776704 [ 824.149978] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 824.149978] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 824.149978] [ 824.163515] loop6: detected capacity change from 0 to 16776704 [ 824.192319] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 04:08:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x1000000}, 0x14}}, 0x0) 04:08:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:50 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:50 executing program 6: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:08:50 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:08:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:08:50 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:08:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 837.826055] loop6: detected capacity change from 0 to 16776704 [ 837.848379] loop2: detected capacity change from 0 to 16776704 04:09:04 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:09:04 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x2000000}, 0x14}}, 0x0) 04:09:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 851.374758] loop2: detected capacity change from 0 to 16776704 04:09:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:04 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x3000000}, 0x14}}, 0x0) 04:09:04 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:09:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 851.508646] loop2: detected capacity change from 0 to 16776704 04:09:04 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:04 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:09:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 851.737197] loop2: detected capacity change from 0 to 16776704 04:09:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x9000000}, 0x14}}, 0x0) 04:09:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:17 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:09:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) 04:09:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 864.299919] loop2: detected capacity change from 0 to 16776704 04:09:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xf000000}, 0x14}}, 0x0) 04:09:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:09:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:17 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:09:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x60000000}, 0x14}}, 0x0) [ 864.488540] loop2: detected capacity change from 0 to 16776704 04:09:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:09:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:09:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xfcffffff}, 0x14}}, 0x0) 04:09:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:32 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:32 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xffffff7f}, 0x14}}, 0x0) 04:09:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:09:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:09:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:09:48 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:48 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:09:48 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:09:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:09:48 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:09:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0xfffffffc}, 0x14}}, 0x0) 04:09:48 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:09:48 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) [ 909.389432] loop2: detected capacity change from 0 to 16776704 [ 909.393398] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 909.393398] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 909.393398] 04:10:02 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) 04:10:02 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1}, 0x14}}, 0x0) 04:10:02 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:10:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 909.413683] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 909.416040] EXT4-fs (loop2): get root inode failed [ 909.416814] EXT4-fs (loop2): mount failed 04:10:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:02 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:02 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:10:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) 04:10:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:02 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:10:02 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x2}, 0x14}}, 0x0) 04:10:02 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 909.623057] loop2: detected capacity change from 0 to 16776704 [ 909.632175] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 909.632175] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 909.632175] [ 909.660455] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 909.662159] EXT4-fs (loop2): get root inode failed [ 909.662838] EXT4-fs (loop2): mount failed 04:10:17 executing program 0: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:17 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:10:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x3}, 0x14}}, 0x0) 04:10:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:17 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:10:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:17 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) 04:10:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) [ 924.328566] loop2: detected capacity change from 0 to 16776704 [ 924.338044] loop3: detected capacity change from 0 to 16776704 04:10:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 924.352978] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 924.352978] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 924.352978] [ 924.372935] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 924.381175] EXT4-fs (loop2): get root inode failed [ 924.382636] EXT4-fs (loop2): mount failed [ 924.421877] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 924.421877] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 924.421877] 04:10:17 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) 04:10:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:10:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x8}, 0x14}}, 0x0) 04:10:17 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) 04:10:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 924.529312] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:10:17 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:17 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x9}, 0x14}}, 0x0) [ 924.582329] loop2: detected capacity change from 0 to 16776704 [ 924.601306] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 924.601306] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 924.601306] [ 924.613498] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 924.619173] EXT4-fs (loop2): get root inode failed [ 924.620323] EXT4-fs (loop2): mount failed 04:10:17 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) 04:10:32 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ftruncate(r4, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:10:32 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:10:32 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:10:32 executing program 7: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:10:32 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xf}, 0x14}}, 0x0) 04:10:32 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 04:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:33 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x60}, 0x14}}, 0x0) [ 940.137252] loop3: detected capacity change from 0 to 16776704 [ 940.164539] loop7: detected capacity change from 0 to 16776704 [ 940.171240] loop2: detected capacity change from 0 to 16776704 [ 940.185759] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 940.185759] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 940.185759] 04:10:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 940.204093] EXT4-fs (loop7): mounted filesystem without journal. Opts: noacl,,errors=continue 04:10:33 executing program 1: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r2) sendmsg$NLBL_CALIPSO_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000024000000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 940.232775] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 940.232775] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 940.232775] [ 940.240339] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 940.240339] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 940.240339] [ 940.288688] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 940.311334] EXT4-fs (loop2): get root inode failed [ 940.312169] EXT4-fs (loop2): mount failed [ 940.330726] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:10:33 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x300}, 0x14}}, 0x0) 04:10:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 1) 04:10:33 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:10:33 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 940.444351] FAULT_INJECTION: forcing a failure. [ 940.444351] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 940.446955] CPU: 1 PID: 7323 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 940.448397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 940.450153] Call Trace: [ 940.450712] dump_stack+0x107/0x167 [ 940.451511] should_fail.cold+0x5/0xa [ 940.452340] _copy_from_user+0x2e/0x1b0 [ 940.453186] do_handle_open+0xad/0x8b0 [ 940.454009] ? fput_many+0x2f/0x1a0 [ 940.454771] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 940.455771] ? ksys_write+0x1a9/0x260 [ 940.456571] ? __ia32_sys_read+0xb0/0xb0 [ 940.457425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 940.458515] ? syscall_enter_from_user_mode+0x1d/0x50 [ 940.459605] do_syscall_64+0x33/0x40 [ 940.460400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 940.461506] RIP: 0033:0x7f110c4eeb19 [ 940.462290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 940.466147] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 940.467739] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 940.469217] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 940.470707] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 940.472238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 940.473724] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 940.524134] loop2: detected capacity change from 0 to 16776704 [ 940.557188] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 940.557188] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 940.557188] [ 940.572497] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 940.578525] EXT4-fs (loop2): get root inode failed [ 940.579650] EXT4-fs (loop2): mount failed [ 951.654840] kworker/dying (328) used greatest stack depth: 23000 bytes left 04:10:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 2) 04:10:46 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:10:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x900}, 0x14}}, 0x0) [ 954.102365] FAULT_INJECTION: forcing a failure. [ 954.102365] name failslab, interval 1, probability 0, space 0, times 0 [ 954.103897] CPU: 0 PID: 7336 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 954.104823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.105938] Call Trace: [ 954.106307] dump_stack+0x107/0x167 [ 954.106801] should_fail.cold+0x5/0xa [ 954.107316] ? do_handle_open+0xf9/0x8b0 [ 954.107862] should_failslab+0x5/0x20 [ 954.108372] __kmalloc+0x72/0x390 [ 954.108841] do_handle_open+0xf9/0x8b0 [ 954.109361] ? fput_many+0x2f/0x1a0 [ 954.109850] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 954.110489] ? ksys_write+0x1a9/0x260 [ 954.111012] ? __ia32_sys_read+0xb0/0xb0 [ 954.111572] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 954.112288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 954.113002] do_syscall_64+0x33/0x40 [ 954.113500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 954.114261] RIP: 0033:0x7f110c4eeb19 [ 954.114776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.117265] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 954.118288] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 954.119247] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 954.120209] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.121163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.122113] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 954.134422] loop2: detected capacity change from 0 to 16776704 [ 954.149825] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 954.149825] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 954.149825] 04:10:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:46 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:10:46 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 1) 04:10:46 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:10:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xf00}, 0x14}}, 0x0) 04:10:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 954.168172] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 954.172053] EXT4-fs (loop2): get root inode failed [ 954.172681] FAULT_INJECTION: forcing a failure. [ 954.172681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 954.173196] EXT4-fs (loop2): mount failed [ 954.174656] CPU: 0 PID: 7346 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 954.174664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.174669] Call Trace: [ 954.174697] dump_stack+0x107/0x167 [ 954.178337] should_fail.cold+0x5/0xa [ 954.178840] _copy_from_user+0x2e/0x1b0 [ 954.179368] do_handle_open+0xad/0x8b0 [ 954.179898] ? fput_many+0x2f/0x1a0 [ 954.180370] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 954.180991] ? ksys_write+0x1a9/0x260 [ 954.181486] ? __ia32_sys_read+0xb0/0xb0 [ 954.182016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 954.182700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 954.183377] do_syscall_64+0x33/0x40 [ 954.183870] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 954.184549] RIP: 0033:0x7f6222aa9b19 [ 954.185029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.187436] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 954.188447] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 954.189379] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 954.190309] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.191237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.192190] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 954.201525] loop3: detected capacity change from 0 to 16776704 [ 954.232895] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 954.232895] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 954.232895] 04:10:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:10:47 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 954.306105] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:10:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x6000}, 0x14}}, 0x0) [ 954.326086] loop2: detected capacity change from 0 to 16776704 04:10:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 954.357236] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 954.357236] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 954.357236] 04:10:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 3) [ 954.389140] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 954.392660] EXT4-fs (loop2): get root inode failed [ 954.393271] EXT4-fs (loop2): mount failed 04:10:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x30000}, 0x14}}, 0x0) 04:10:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 2) [ 954.454680] FAULT_INJECTION: forcing a failure. [ 954.454680] name failslab, interval 1, probability 0, space 0, times 0 [ 954.457035] CPU: 1 PID: 7387 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 954.458444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.460171] Call Trace: [ 954.460730] dump_stack+0x107/0x167 [ 954.461522] should_fail.cold+0x5/0xa [ 954.462326] ? do_handle_open+0xf9/0x8b0 [ 954.463175] should_failslab+0x5/0x20 [ 954.463993] __kmalloc+0x72/0x390 [ 954.464725] do_handle_open+0xf9/0x8b0 [ 954.465538] ? fput_many+0x2f/0x1a0 [ 954.466455] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 954.467432] ? ksys_write+0x1a9/0x260 [ 954.468420] ? __ia32_sys_read+0xb0/0xb0 [ 954.469278] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 954.470608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 954.471828] do_syscall_64+0x33/0x40 [ 954.472784] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 954.473895] RIP: 0033:0x7f6222aa9b19 [ 954.474700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.478549] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 954.480157] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 954.481647] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 954.483141] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.484644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.486160] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 04:10:47 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x3c, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x51}, 0x20004000) 04:10:47 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:10:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 954.495984] FAULT_INJECTION: forcing a failure. [ 954.495984] name failslab, interval 1, probability 0, space 0, times 0 [ 954.498539] CPU: 1 PID: 7386 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 954.499986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.501684] Call Trace: [ 954.502245] dump_stack+0x107/0x167 [ 954.503003] should_fail.cold+0x5/0xa [ 954.503813] ? create_object.isra.0+0x3a/0xa30 [ 954.504758] should_failslab+0x5/0x20 [ 954.505550] kmem_cache_alloc+0x5b/0x310 [ 954.506404] create_object.isra.0+0x3a/0xa30 [ 954.507314] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 954.508365] __kmalloc+0x16e/0x390 [ 954.509121] do_handle_open+0xf9/0x8b0 [ 954.509933] ? fput_many+0x2f/0x1a0 [ 954.510696] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 954.511711] ? ksys_write+0x1a9/0x260 [ 954.512494] ? __ia32_sys_read+0xb0/0xb0 [ 954.513339] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 954.514423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 954.515490] do_syscall_64+0x33/0x40 [ 954.516272] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 954.517329] RIP: 0033:0x7f110c4eeb19 [ 954.518101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.521911] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 954.523483] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 954.524974] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 954.526446] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.527936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.529428] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 954.545540] loop2: detected capacity change from 0 to 16776704 [ 954.553290] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 954.553290] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 954.553290] [ 954.571834] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 954.575772] EXT4-fs (loop2): get root inode failed [ 954.576338] EXT4-fs (loop2): mount failed 04:11:03 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:11:03 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x1) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 3) 04:11:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x80000}, 0x14}}, 0x0) 04:11:03 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) [ 970.247200] loop3: detected capacity change from 0 to 16776704 04:11:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:11:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 4) 04:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 970.261436] FAULT_INJECTION: forcing a failure. [ 970.261436] name failslab, interval 1, probability 0, space 0, times 0 [ 970.264637] CPU: 0 PID: 7417 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 970.266105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.267879] Call Trace: [ 970.268454] dump_stack+0x107/0x167 [ 970.269253] should_fail.cold+0x5/0xa [ 970.270082] ? create_object.isra.0+0x3a/0xa30 [ 970.271082] should_failslab+0x5/0x20 [ 970.271913] kmem_cache_alloc+0x5b/0x310 [ 970.272794] create_object.isra.0+0x3a/0xa30 [ 970.272829] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 970.272829] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 970.272829] [ 970.273733] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 970.273761] __kmalloc+0x16e/0x390 [ 970.273790] do_handle_open+0xf9/0x8b0 [ 970.273808] ? fput_many+0x2f/0x1a0 [ 970.273829] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 970.273854] ? ksys_write+0x1a9/0x260 [ 970.282549] ? __ia32_sys_read+0xb0/0xb0 [ 970.283423] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.284569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.285669] do_syscall_64+0x33/0x40 [ 970.286473] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.287580] RIP: 0033:0x7f6222aa9b19 [ 970.288382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.292299] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 970.293942] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 970.295475] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 970.297000] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.298535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.300083] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 970.353770] FAULT_INJECTION: forcing a failure. [ 970.353770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 970.356925] CPU: 0 PID: 7426 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 970.358662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.360744] Call Trace: [ 970.361408] dump_stack+0x107/0x167 [ 970.362326] should_fail.cold+0x5/0xa [ 970.363282] _copy_from_user+0x2e/0x1b0 [ 970.364300] do_handle_open+0x16c/0x8b0 [ 970.365296] ? fput_many+0x2f/0x1a0 [ 970.366215] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 970.367403] ? ksys_write+0x1a9/0x260 [ 970.368383] ? __ia32_sys_read+0xb0/0xb0 [ 970.369422] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.370737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.372053] do_syscall_64+0x33/0x40 [ 970.372993] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.374280] RIP: 0033:0x7f110c4eeb19 [ 970.375215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.379846] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 970.382009] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 970.383809] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 970.385593] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.387392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.389187] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 04:11:03 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:03 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 4) 04:11:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 5) [ 970.433541] loop2: detected capacity change from 0 to 16776704 [ 970.436127] cgroup2: Unknown parameter 'noacl' [ 970.455324] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:11:03 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x1000000}, 0x14}}, 0x0) 04:11:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 970.553099] FAULT_INJECTION: forcing a failure. [ 970.553099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 970.555899] CPU: 1 PID: 7446 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 970.557474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.559394] Call Trace: [ 970.560030] dump_stack+0x107/0x167 [ 970.560899] should_fail.cold+0x5/0xa [ 970.561793] _copy_from_user+0x2e/0x1b0 [ 970.562727] do_handle_open+0x16c/0x8b0 [ 970.563648] ? fput_many+0x2f/0x1a0 [ 970.564502] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 970.565588] ? ksys_write+0x1a9/0x260 [ 970.566469] ? __ia32_sys_read+0xb0/0xb0 [ 970.567414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.568654] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.569862] do_syscall_64+0x33/0x40 [ 970.570724] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.571921] RIP: 0033:0x7f6222aa9b19 [ 970.572780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.577077] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 970.578825] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 970.580473] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 970.582123] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.583721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.585336] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 970.592960] FAULT_INJECTION: forcing a failure. [ 970.592960] name failslab, interval 1, probability 0, space 0, times 0 [ 970.594663] loop2: detected capacity change from 0 to 16776704 [ 970.595693] CPU: 1 PID: 7444 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 970.598513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 970.600392] Call Trace: [ 970.600996] dump_stack+0x107/0x167 [ 970.601833] should_fail.cold+0x5/0xa [ 970.602692] ? alloc_inode+0x171/0x240 [ 970.603562] should_failslab+0x5/0x20 [ 970.604434] kmem_cache_alloc+0x5b/0x310 [ 970.605350] ? lock_downgrade+0x6d0/0x6d0 [ 970.606281] alloc_inode+0x171/0x240 [ 970.607074] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 970.607074] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 970.607074] [ 970.610478] iget_locked+0x1ae/0x6a0 [ 970.611319] kernfs_get_inode+0x47/0x520 [ 970.612250] __kernfs_fh_to_dentry+0x12b/0x270 [ 970.613285] exportfs_decode_fh_raw+0x12a/0x7b0 [ 970.614321] ? drop_caches_sysctl_handler+0x110/0x110 [ 970.615474] ? kernfs_fh_to_parent+0x40/0x40 [ 970.616488] ? reconnect_path+0x810/0x810 [ 970.617428] ? lock_acquire+0x197/0x470 [ 970.618313] ? find_held_lock+0x2c/0x110 [ 970.619232] ? __fget_files+0x2cf/0x520 [ 970.620132] ? lock_downgrade+0x6d0/0x6d0 [ 970.621071] ? lock_downgrade+0x6d0/0x6d0 [ 970.622010] ? __fget_files+0x2f8/0x520 [ 970.622909] ? drop_caches_sysctl_handler+0x110/0x110 [ 970.624076] exportfs_decode_fh+0x38/0x90 [ 970.625009] do_handle_open+0x2bb/0x8b0 [ 970.625903] ? fput_many+0x2f/0x1a0 [ 970.626723] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 970.627794] ? ksys_write+0x1a9/0x260 [ 970.628660] ? __ia32_sys_read+0xb0/0xb0 [ 970.629586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 970.630758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 970.631937] do_syscall_64+0x33/0x40 [ 970.632780] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 970.633929] RIP: 0033:0x7f110c4eeb19 [ 970.634775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.638892] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 970.640604] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 970.642203] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 970.643816] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.645411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.647021] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 970.678540] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 970.684654] EXT4-fs (loop2): get root inode failed [ 970.685822] EXT4-fs (loop2): mount failed [ 986.692397] loop3: detected capacity change from 0 to 16776704 [ 986.693697] FAULT_INJECTION: forcing a failure. [ 986.693697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.693720] CPU: 1 PID: 7471 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 986.693731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 986.693738] Call Trace: [ 986.693764] dump_stack+0x107/0x167 04:11:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 6) 04:11:19 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:11:19 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 5) 04:11:19 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:11:19 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x2000000}, 0x14}}, 0x0) 04:11:19 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 1) 04:11:19 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 986.693787] should_fail.cold+0x5/0xa [ 986.693815] _copy_from_user+0x2e/0x1b0 [ 986.693843] do_handle_open+0xad/0x8b0 [ 986.693861] ? fput_many+0x2f/0x1a0 [ 986.693881] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 986.693895] ? ksys_write+0x1a9/0x260 [ 986.693927] ? __ia32_sys_read+0xb0/0xb0 [ 986.706574] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 986.707644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 986.708700] do_syscall_64+0x33/0x40 [ 986.709457] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 986.710506] RIP: 0033:0x7f625797cb19 [ 986.711266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.711354] FAULT_INJECTION: forcing a failure. [ 986.711354] name failslab, interval 1, probability 0, space 0, times 0 [ 986.715014] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 986.715035] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 986.715047] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 986.715067] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.723134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.724609] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 986.726101] CPU: 0 PID: 7473 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 986.727518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 986.729228] Call Trace: [ 986.729784] dump_stack+0x107/0x167 [ 986.730537] should_fail.cold+0x5/0xa [ 986.731317] ? alloc_inode+0x171/0x240 [ 986.732136] should_failslab+0x5/0x20 [ 986.732914] kmem_cache_alloc+0x5b/0x310 [ 986.733753] ? lock_downgrade+0x6d0/0x6d0 [ 986.734612] alloc_inode+0x171/0x240 [ 986.735376] iget_locked+0x1ae/0x6a0 [ 986.736151] kernfs_get_inode+0x47/0x520 [ 986.737002] __kernfs_fh_to_dentry+0x12b/0x270 [ 986.737944] exportfs_decode_fh_raw+0x12a/0x7b0 [ 986.738891] ? drop_caches_sysctl_handler+0x110/0x110 [ 986.739954] ? kernfs_fh_to_parent+0x40/0x40 [ 986.740859] ? reconnect_path+0x810/0x810 [ 986.741718] ? lock_acquire+0x197/0x470 [ 986.742536] ? find_held_lock+0x2c/0x110 [ 986.743372] ? __fget_files+0x2cf/0x520 [ 986.744193] ? lock_downgrade+0x6d0/0x6d0 [ 986.745051] ? lock_downgrade+0x6d0/0x6d0 [ 986.745913] ? __fget_files+0x2f8/0x520 [ 986.746723] ? drop_caches_sysctl_handler+0x110/0x110 [ 986.747775] exportfs_decode_fh+0x38/0x90 [ 986.748638] do_handle_open+0x2bb/0x8b0 [ 986.749458] ? fput_many+0x2f/0x1a0 [ 986.750204] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 986.751187] ? ksys_write+0x1a9/0x260 [ 986.751984] ? __ia32_sys_read+0xb0/0xb0 [ 986.752819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 986.753885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 986.754941] do_syscall_64+0x33/0x40 [ 986.755697] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 986.756757] RIP: 0033:0x7f6222aa9b19 [ 986.757518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.761256] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 986.762790] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 986.764254] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 986.765711] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.767163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.768639] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 986.804099] FAULT_INJECTION: forcing a failure. [ 986.804099] name failslab, interval 1, probability 0, space 0, times 0 [ 986.804209] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 986.804209] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 986.804209] [ 986.806457] CPU: 0 PID: 7474 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 986.806470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 986.806477] Call Trace: [ 986.806504] dump_stack+0x107/0x167 [ 986.806529] should_fail.cold+0x5/0xa [ 986.806563] ? create_object.isra.0+0x3a/0xa30 [ 986.806583] should_failslab+0x5/0x20 [ 986.806603] kmem_cache_alloc+0x5b/0x310 [ 986.806632] create_object.isra.0+0x3a/0xa30 [ 986.818081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 986.819132] kmem_cache_alloc+0x159/0x310 [ 986.820004] alloc_inode+0x171/0x240 [ 986.820768] iget_locked+0x1ae/0x6a0 [ 986.821527] kernfs_get_inode+0x47/0x520 [ 986.822401] __kernfs_fh_to_dentry+0x12b/0x270 [ 986.823353] exportfs_decode_fh_raw+0x12a/0x7b0 [ 986.824332] ? drop_caches_sysctl_handler+0x110/0x110 [ 986.825381] ? kernfs_fh_to_parent+0x40/0x40 [ 986.826285] ? reconnect_path+0x810/0x810 [ 986.827145] ? lock_acquire+0x197/0x470 [ 986.827979] ? find_held_lock+0x2c/0x110 [ 986.828819] ? __fget_files+0x2cf/0x520 [ 986.829630] ? lock_downgrade+0x6d0/0x6d0 [ 986.830478] ? lock_downgrade+0x6d0/0x6d0 [ 986.831336] ? __fget_files+0x2f8/0x520 [ 986.832162] ? drop_caches_sysctl_handler+0x110/0x110 [ 986.833218] exportfs_decode_fh+0x38/0x90 [ 986.834104] do_handle_open+0x2bb/0x8b0 [ 986.834931] ? fput_many+0x2f/0x1a0 [ 986.835678] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 986.836654] ? ksys_write+0x1a9/0x260 [ 986.837436] ? __ia32_sys_read+0xb0/0xb0 [ 986.838274] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 986.839351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 986.840428] do_syscall_64+0x33/0x40 [ 986.841199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 986.842251] RIP: 0033:0x7f110c4eeb19 [ 986.843023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 986.846799] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 986.848358] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 986.849819] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 986.851285] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 986.852761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.854230] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 04:11:19 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r4, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) [ 986.865982] loop2: detected capacity change from 0 to 16776704 [ 986.908687] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 986.908687] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 986.908687] [ 986.950343] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 986.968663] EXT4-fs (loop2): get root inode failed [ 986.969557] EXT4-fs (loop2): mount failed [ 987.043208] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:11:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x3000000}, 0x14}}, 0x0) 04:11:35 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:35 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000180), r1) 04:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:11:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:11:35 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 6) 04:11:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 7) 04:11:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 2) [ 1002.733169] loop3: detected capacity change from 0 to 16776704 [ 1002.750537] FAULT_INJECTION: forcing a failure. [ 1002.750537] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.753426] CPU: 0 PID: 7506 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1002.755168] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1002.757225] Call Trace: [ 1002.757805] dump_stack+0x107/0x167 [ 1002.758598] should_fail.cold+0x5/0xa [ 1002.759429] ? do_handle_open+0xf9/0x8b0 [ 1002.760315] should_failslab+0x5/0x20 [ 1002.761142] __kmalloc+0x72/0x390 [ 1002.761904] do_handle_open+0xf9/0x8b0 [ 1002.762751] ? fput_many+0x2f/0x1a0 [ 1002.763543] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1002.764578] ? ksys_write+0x1a9/0x260 [ 1002.765410] ? __ia32_sys_read+0xb0/0xb0 [ 1002.766307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1002.767454] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1002.768597] do_syscall_64+0x33/0x40 [ 1002.769411] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1002.770527] RIP: 0033:0x7f625797cb19 [ 1002.771341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.773290] FAULT_INJECTION: forcing a failure. [ 1002.773290] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.775371] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1002.775393] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1002.775404] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1002.775415] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.775426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1002.775445] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1002.787170] CPU: 1 PID: 7513 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1002.787544] loop2: detected capacity change from 0 to 16776704 [ 1002.788694] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1002.788701] Call Trace: [ 1002.788723] dump_stack+0x107/0x167 [ 1002.788745] should_fail.cold+0x5/0xa [ 1002.793995] ? security_inode_alloc+0x34/0x160 [ 1002.794996] should_failslab+0x5/0x20 [ 1002.795827] kmem_cache_alloc+0x5b/0x310 [ 1002.796743] security_inode_alloc+0x34/0x160 [ 1002.797710] inode_init_always+0xa4e/0xd10 [ 1002.798638] alloc_inode+0x84/0x240 [ 1002.799434] iget_locked+0x1ae/0x6a0 [ 1002.800284] kernfs_get_inode+0x47/0x520 [ 1002.801181] __kernfs_fh_to_dentry+0x12b/0x270 [ 1002.802191] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1002.803208] ? drop_caches_sysctl_handler+0x110/0x110 [ 1002.804363] ? kernfs_fh_to_parent+0x40/0x40 [ 1002.805319] ? reconnect_path+0x810/0x810 [ 1002.806227] ? lock_acquire+0x197/0x470 [ 1002.807087] ? find_held_lock+0x2c/0x110 [ 1002.807990] ? __fget_files+0x2cf/0x520 [ 1002.808868] ? lock_downgrade+0x6d0/0x6d0 [ 1002.809772] ? lock_downgrade+0x6d0/0x6d0 [ 1002.810683] ? __fget_files+0x2f8/0x520 [ 1002.811551] ? drop_caches_sysctl_handler+0x110/0x110 [ 1002.812702] exportfs_decode_fh+0x38/0x90 [ 1002.813608] do_handle_open+0x2bb/0x8b0 [ 1002.814476] ? fput_many+0x2f/0x1a0 [ 1002.815268] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1002.816316] ? ksys_write+0x1a9/0x260 [ 1002.817145] ? __ia32_sys_read+0xb0/0xb0 [ 1002.818036] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1002.819179] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1002.820326] do_syscall_64+0x33/0x40 [ 1002.821140] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1002.822254] RIP: 0033:0x7f110c4eeb19 [ 1002.823061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.827082] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1002.828769] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1002.830331] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1002.831880] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.833464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1002.835007] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 1002.840044] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1002.840044] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1002.840044] 04:11:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 1002.849780] FAULT_INJECTION: forcing a failure. [ 1002.849780] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.852370] CPU: 1 PID: 7511 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1002.853866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1002.855674] Call Trace: [ 1002.856275] dump_stack+0x107/0x167 [ 1002.857074] should_fail.cold+0x5/0xa [ 1002.857905] ? create_object.isra.0+0x3a/0xa30 [ 1002.858902] should_failslab+0x5/0x20 [ 1002.859732] kmem_cache_alloc+0x5b/0x310 [ 1002.860653] create_object.isra.0+0x3a/0xa30 [ 1002.861611] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1002.862721] kmem_cache_alloc+0x159/0x310 [ 1002.863631] alloc_inode+0x171/0x240 [ 1002.864468] iget_locked+0x1ae/0x6a0 [ 1002.865283] kernfs_get_inode+0x47/0x520 [ 1002.866173] __kernfs_fh_to_dentry+0x12b/0x270 [ 1002.867176] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1002.868214] ? drop_caches_sysctl_handler+0x110/0x110 [ 1002.869337] ? kernfs_fh_to_parent+0x40/0x40 [ 1002.870298] ? reconnect_path+0x810/0x810 [ 1002.871218] ? lock_acquire+0x197/0x470 [ 1002.872114] ? find_held_lock+0x2c/0x110 [ 1002.873003] ? __fget_files+0x2cf/0x520 [ 1002.873868] ? lock_downgrade+0x6d0/0x6d0 [ 1002.874774] ? lock_downgrade+0x6d0/0x6d0 [ 1002.875688] ? __fget_files+0x2f8/0x520 [ 1002.876579] ? drop_caches_sysctl_handler+0x110/0x110 [ 1002.877704] exportfs_decode_fh+0x38/0x90 [ 1002.878608] do_handle_open+0x2bb/0x8b0 [ 1002.879471] ? fput_many+0x2f/0x1a0 [ 1002.880284] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1002.881307] ? ksys_write+0x1a9/0x260 [ 1002.882135] ? __ia32_sys_read+0xb0/0xb0 [ 1002.883022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1002.884192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1002.885317] do_syscall_64+0x33/0x40 [ 1002.886129] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1002.887242] RIP: 0033:0x7f6222aa9b19 [ 1002.888076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1002.892104] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1002.893763] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1002.895316] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1002.896979] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.898540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1002.900115] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1002.905105] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1002.918294] EXT4-fs (loop2): get root inode failed [ 1002.919446] EXT4-fs (loop2): mount failed [ 1002.921354] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1002.921354] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1002.921354] 04:11:35 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {&(0x7f00000005c0)=""/95, 0x5f}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:35 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 3) [ 1002.981804] FAULT_INJECTION: forcing a failure. 04:11:35 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x9000000}, 0x14}}, 0x0) [ 1002.981804] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.984515] CPU: 1 PID: 7527 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1002.986007] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1002.987814] Call Trace: [ 1002.988418] dump_stack+0x107/0x167 [ 1002.989220] should_fail.cold+0x5/0xa [ 1002.990054] ? create_object.isra.0+0x3a/0xa30 [ 1002.991053] should_failslab+0x5/0x20 [ 1002.991886] kmem_cache_alloc+0x5b/0x310 [ 1002.992811] create_object.isra.0+0x3a/0xa30 [ 1002.993769] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1002.994883] __kmalloc+0x16e/0x390 [ 1002.995669] do_handle_open+0xf9/0x8b0 [ 1002.996538] ? fput_many+0x2f/0x1a0 [ 1002.997327] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1002.998345] ? ksys_write+0x1a9/0x260 [ 1002.999166] ? __ia32_sys_read+0xb0/0xb0 [ 1003.000086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1003.001219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1003.002336] do_syscall_64+0x33/0x40 [ 1003.003140] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1003.004275] RIP: 0033:0x7f625797cb19 [ 1003.005078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.009099] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1003.010794] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1003.012373] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1003.013919] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.015459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.017032] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1003.039275] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:11:35 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) 04:11:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:11:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 8) [ 1003.156929] loop2: detected capacity change from 0 to 16776704 [ 1003.165981] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1003.165981] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1003.165981] 04:11:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xf000000}, 0x14}}, 0x0) 04:11:36 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 1003.182077] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1003.187151] EXT4-fs (loop2): get root inode failed [ 1003.188332] EXT4-fs (loop2): mount failed [ 1003.226263] FAULT_INJECTION: forcing a failure. [ 1003.226263] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.228910] CPU: 1 PID: 7543 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1003.230391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1003.232223] Call Trace: [ 1003.232798] dump_stack+0x107/0x167 [ 1003.233594] should_fail.cold+0x5/0xa [ 1003.234421] ? __alloc_file+0x21/0x320 [ 1003.235267] should_failslab+0x5/0x20 [ 1003.236123] kmem_cache_alloc+0x5b/0x310 [ 1003.237007] ? create_object.isra.0+0x3ad/0xa30 [ 1003.238019] __alloc_file+0x21/0x320 [ 1003.238828] alloc_empty_file+0x6d/0x170 [ 1003.239714] path_openat+0xe6/0x2770 [ 1003.240555] ? lock_downgrade+0x6d0/0x6d0 [ 1003.241500] ? path_lookupat+0x860/0x860 [ 1003.242392] ? trace_hardirqs_on+0x5b/0x180 [ 1003.243331] ? kmem_cache_alloc+0x2a6/0x310 [ 1003.244289] ? memcpy+0x39/0x60 [ 1003.245047] do_file_open_root+0x268/0x4e0 [ 1003.245972] ? do_filp_open+0x3e0/0x3e0 [ 1003.246836] ? SOFTIRQ_verbose+0x10/0x10 [ 1003.247729] ? expand_files+0x60a/0xa80 [ 1003.248637] ? find_held_lock+0x2c/0x110 [ 1003.249522] ? alloc_fd+0x2e7/0x670 [ 1003.250307] ? lock_downgrade+0x6d0/0x6d0 [ 1003.251198] ? do_raw_spin_lock+0x121/0x260 [ 1003.252166] file_open_root+0x2b8/0x440 [ 1003.253031] ? vfs_fallocate+0xda0/0xda0 [ 1003.253914] ? alloc_fd+0x2e7/0x670 [ 1003.254715] do_handle_open+0x32f/0x8b0 [ 1003.255579] ? fput_many+0x2f/0x1a0 [ 1003.256390] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1003.257405] ? ksys_write+0x1a9/0x260 [ 1003.258223] ? __ia32_sys_read+0xb0/0xb0 [ 1003.259102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1003.260271] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1003.261390] do_syscall_64+0x33/0x40 [ 1003.262195] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1003.263300] RIP: 0033:0x7f110c4eeb19 [ 1003.264129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.268114] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 04:11:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) [ 1003.269752] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1003.271532] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1003.273110] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.274650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.276210] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 04:11:36 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:11:36 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 4) 04:11:36 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 7) 04:11:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 9) 04:11:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x22040) [ 1003.417074] FAULT_INJECTION: forcing a failure. [ 1003.417074] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.419608] CPU: 0 PID: 7557 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1003.421101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1003.422907] Call Trace: [ 1003.423488] dump_stack+0x107/0x167 [ 1003.424292] should_fail.cold+0x5/0xa [ 1003.425125] ? security_inode_alloc+0x34/0x160 [ 1003.426115] should_failslab+0x5/0x20 [ 1003.426941] kmem_cache_alloc+0x5b/0x310 [ 1003.427827] security_inode_alloc+0x34/0x160 [ 1003.428795] inode_init_always+0xa4e/0xd10 [ 1003.429722] alloc_inode+0x84/0x240 [ 1003.430512] iget_locked+0x1ae/0x6a0 [ 1003.431377] kernfs_get_inode+0x47/0x520 [ 1003.432434] __kernfs_fh_to_dentry+0x12b/0x270 [ 1003.433612] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1003.434444] FAULT_INJECTION: forcing a failure. [ 1003.434444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1003.434800] ? drop_caches_sysctl_handler+0x110/0x110 [ 1003.434824] ? kernfs_fh_to_parent+0x40/0x40 [ 1003.434853] ? reconnect_path+0x810/0x810 [ 1003.440745] ? lock_acquire+0x197/0x470 [ 1003.441764] ? find_held_lock+0x2c/0x110 [ 1003.442810] ? __fget_files+0x2cf/0x520 [ 1003.443831] ? lock_downgrade+0x6d0/0x6d0 [ 1003.444903] ? lock_downgrade+0x6d0/0x6d0 [ 1003.445978] ? __fget_files+0x2f8/0x520 [ 1003.446997] ? drop_caches_sysctl_handler+0x110/0x110 [ 1003.448328] exportfs_decode_fh+0x38/0x90 [ 1003.449393] do_handle_open+0x2bb/0x8b0 [ 1003.450412] ? fput_many+0x2f/0x1a0 [ 1003.451342] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1003.452556] ? ksys_write+0x1a9/0x260 [ 1003.453535] ? __ia32_sys_read+0xb0/0xb0 [ 1003.454577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1003.455918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1003.457253] do_syscall_64+0x33/0x40 [ 1003.458210] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1003.459522] RIP: 0033:0x7f6222aa9b19 [ 1003.460485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.465182] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1003.467123] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1003.468947] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1003.470766] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.472593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.474416] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1003.476282] CPU: 1 PID: 7558 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1003.477739] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1003.479502] Call Trace: [ 1003.480091] dump_stack+0x107/0x167 [ 1003.480861] should_fail.cold+0x5/0xa [ 1003.481668] _copy_from_user+0x2e/0x1b0 [ 1003.482513] do_handle_open+0x16c/0x8b0 [ 1003.483346] ? fput_many+0x2f/0x1a0 [ 1003.484137] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1003.485129] ? ksys_write+0x1a9/0x260 [ 1003.485941] ? __ia32_sys_read+0xb0/0xb0 [ 1003.486808] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1003.487918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1003.489047] do_syscall_64+0x33/0x40 [ 1003.489840] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1003.490926] RIP: 0033:0x7f625797cb19 [ 1003.491722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.495603] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1003.497222] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1003.498713] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1003.500232] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.501731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.503224] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1003.509164] FAULT_INJECTION: forcing a failure. [ 1003.509164] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.512008] CPU: 0 PID: 7559 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1003.513711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1003.515771] Call Trace: [ 1003.516444] dump_stack+0x107/0x167 [ 1003.517359] should_fail.cold+0x5/0xa [ 1003.518310] ? __d_alloc+0x2a/0x990 [ 1003.519213] should_failslab+0x5/0x20 [ 1003.520168] kmem_cache_alloc+0x5b/0x310 [ 1003.521171] ? do_raw_spin_lock+0x121/0x260 [ 1003.522064] loop3: detected capacity change from 0 to 16776704 [ 1003.522248] __d_alloc+0x2a/0x990 [ 1003.524329] __d_obtain_alias+0x100/0x170 [ 1003.525371] __kernfs_fh_to_dentry+0x148/0x270 [ 1003.526520] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1003.527681] ? drop_caches_sysctl_handler+0x110/0x110 [ 1003.528981] ? kernfs_fh_to_parent+0x40/0x40 [ 1003.530087] ? reconnect_path+0x810/0x810 [ 1003.531135] ? lock_acquire+0x197/0x470 [ 1003.532139] ? find_held_lock+0x2c/0x110 [ 1003.532846] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1003.532846] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1003.532846] [ 1003.533159] ? __fget_files+0x2cf/0x520 [ 1003.537324] ? lock_downgrade+0x6d0/0x6d0 [ 1003.538374] ? lock_downgrade+0x6d0/0x6d0 [ 1003.539422] ? __fget_files+0x2f8/0x520 [ 1003.540428] ? drop_caches_sysctl_handler+0x110/0x110 [ 1003.541720] exportfs_decode_fh+0x38/0x90 [ 1003.542751] do_handle_open+0x2bb/0x8b0 [ 1003.543734] ? fput_many+0x2f/0x1a0 [ 1003.544643] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1003.545809] ? ksys_write+0x1a9/0x260 [ 1003.546753] ? __ia32_sys_read+0xb0/0xb0 [ 1003.547765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1003.549070] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1003.550353] do_syscall_64+0x33/0x40 [ 1003.551276] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1003.552551] RIP: 0033:0x7f110c4eeb19 [ 1003.553472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1003.558041] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1003.559932] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1003.561699] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1003.563465] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.565234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.566999] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 1003.629060] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:11:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:11:49 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:11:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 10) 04:11:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x60000000}, 0x14}}, 0x0) 04:11:49 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 8) 04:11:49 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:11:49 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 5) 04:11:49 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) [ 1017.054119] loop2: detected capacity change from 0 to 16776704 [ 1017.069541] FAULT_INJECTION: forcing a failure. [ 1017.069541] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.071450] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1017.071450] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1017.071450] [ 1017.072249] CPU: 1 PID: 7579 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1017.075981] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.077983] Call Trace: [ 1017.078633] dump_stack+0x107/0x167 [ 1017.079507] should_fail.cold+0x5/0xa [ 1017.080443] ? alloc_inode+0x171/0x240 [ 1017.081388] should_failslab+0x5/0x20 [ 1017.082307] kmem_cache_alloc+0x5b/0x310 [ 1017.083307] ? lock_downgrade+0x6d0/0x6d0 [ 1017.084337] alloc_inode+0x171/0x240 [ 1017.085225] iget_locked+0x1ae/0x6a0 [ 1017.086135] kernfs_get_inode+0x47/0x520 [ 1017.087119] __kernfs_fh_to_dentry+0x12b/0x270 [ 1017.088217] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1017.089339] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.090597] ? kernfs_fh_to_parent+0x40/0x40 [ 1017.091797] ? reconnect_path+0x810/0x810 [ 1017.092986] ? lock_acquire+0x197/0x470 [ 1017.094100] ? find_held_lock+0x2c/0x110 [ 1017.095079] ? __fget_files+0x2cf/0x520 [ 1017.096000] ? lock_downgrade+0x6d0/0x6d0 [ 1017.097006] ? lock_downgrade+0x6d0/0x6d0 [ 1017.097988] ? __fget_files+0x2f8/0x520 [ 1017.098940] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.100166] exportfs_decode_fh+0x38/0x90 [ 1017.101144] do_handle_open+0x2bb/0x8b0 [ 1017.102092] ? fput_many+0x2f/0x1a0 [ 1017.102959] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.104107] ? ksys_write+0x1a9/0x260 [ 1017.105042] ? __ia32_sys_read+0xb0/0xb0 [ 1017.106007] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.107276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.108589] do_syscall_64+0x33/0x40 [ 1017.109515] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.110755] RIP: 0033:0x7f625797cb19 [ 1017.111676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.116094] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.117856] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1017.119522] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.121251] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.122936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.124638] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1017.138458] FAULT_INJECTION: forcing a failure. [ 1017.138458] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.140069] CPU: 0 PID: 7586 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1017.140995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.142132] Call Trace: [ 1017.142513] dump_stack+0x107/0x167 [ 1017.143034] should_fail.cold+0x5/0xa [ 1017.143560] ? create_object.isra.0+0x3a/0xa30 [ 1017.144193] should_failslab+0x5/0x20 [ 1017.144723] kmem_cache_alloc+0x5b/0x310 [ 1017.145280] create_object.isra.0+0x3a/0xa30 [ 1017.145872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1017.146560] kmem_cache_alloc+0x159/0x310 [ 1017.147142] security_inode_alloc+0x34/0x160 [ 1017.147739] inode_init_always+0xa4e/0xd10 [ 1017.148320] alloc_inode+0x84/0x240 [ 1017.148808] iget_locked+0x1ae/0x6a0 [ 1017.149317] kernfs_get_inode+0x47/0x520 [ 1017.149876] __kernfs_fh_to_dentry+0x12b/0x270 [ 1017.150494] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1017.151119] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.151809] ? kernfs_fh_to_parent+0x40/0x40 [ 1017.152407] ? reconnect_path+0x810/0x810 [ 1017.152975] ? lock_acquire+0x197/0x470 [ 1017.153505] ? find_held_lock+0x2c/0x110 [ 1017.154060] ? __fget_files+0x2cf/0x520 [ 1017.154610] ? lock_downgrade+0x6d0/0x6d0 [ 1017.154940] FAULT_INJECTION: forcing a failure. [ 1017.154940] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.155172] ? lock_downgrade+0x6d0/0x6d0 [ 1017.155194] ? __fget_files+0x2f8/0x520 [ 1017.155210] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.155233] exportfs_decode_fh+0x38/0x90 [ 1017.160178] do_handle_open+0x2bb/0x8b0 [ 1017.160712] ? fput_many+0x2f/0x1a0 [ 1017.161201] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.161825] ? ksys_write+0x1a9/0x260 [ 1017.162331] ? __ia32_sys_read+0xb0/0xb0 [ 1017.162887] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.163596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.164294] do_syscall_64+0x33/0x40 [ 1017.164792] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.165479] RIP: 0033:0x7f6222aa9b19 [ 1017.165980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.168453] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.169477] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1017.170434] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.171381] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.172331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.173281] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1017.174266] CPU: 1 PID: 7587 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1017.175916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.177915] Call Trace: [ 1017.178544] dump_stack+0x107/0x167 [ 1017.179411] should_fail.cold+0x5/0xa [ 1017.180323] ? create_object.isra.0+0x3a/0xa30 [ 1017.181393] should_failslab+0x5/0x20 [ 1017.182250] kmem_cache_alloc+0x5b/0x310 [ 1017.183208] create_object.isra.0+0x3a/0xa30 [ 1017.184394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1017.185849] kmem_cache_alloc+0x159/0x310 [ 1017.186925] __d_alloc+0x2a/0x990 [ 1017.187807] __d_obtain_alias+0x100/0x170 [ 1017.188930] __kernfs_fh_to_dentry+0x148/0x270 [ 1017.189950] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1017.190979] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.192124] ? kernfs_fh_to_parent+0x40/0x40 [ 1017.193107] ? reconnect_path+0x810/0x810 [ 1017.194032] ? lock_acquire+0x197/0x470 [ 1017.194911] ? find_held_lock+0x2c/0x110 [ 1017.195825] ? __fget_files+0x2cf/0x520 [ 1017.196722] ? lock_downgrade+0x6d0/0x6d0 [ 1017.197654] ? lock_downgrade+0x6d0/0x6d0 [ 1017.198584] ? __fget_files+0x2f8/0x520 [ 1017.199473] ? drop_caches_sysctl_handler+0x110/0x110 [ 1017.200636] exportfs_decode_fh+0x38/0x90 [ 1017.201570] do_handle_open+0x2bb/0x8b0 [ 1017.202453] ? fput_many+0x2f/0x1a0 [ 1017.203262] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.204326] ? ksys_write+0x1a9/0x260 [ 1017.205181] ? __ia32_sys_read+0xb0/0xb0 [ 1017.206097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.207283] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.208450] do_syscall_64+0x33/0x40 [ 1017.209293] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.210441] RIP: 0033:0x7f110c4eeb19 [ 1017.211276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.215422] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.217151] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1017.218768] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.220382] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.222001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1017.223623] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 1017.225899] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1017.228939] loop3: detected capacity change from 0 to 16776704 [ 1017.242061] EXT4-fs (loop2): get root inode failed [ 1017.243385] EXT4-fs (loop2): mount failed 04:11:50 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 6) 04:11:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xfcffffff}, 0x14}}, 0x0) [ 1017.322026] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1017.322026] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1017.322026] 04:11:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:11:50 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 9) [ 1017.376520] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:11:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x22040) 04:11:50 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xffffff7f}, 0x14}}, 0x0) 04:11:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:11:50 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 1017.436973] FAULT_INJECTION: forcing a failure. [ 1017.436973] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.438120] FAULT_INJECTION: forcing a failure. [ 1017.438120] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.438360] CPU: 0 PID: 7614 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1017.441464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.442447] Call Trace: [ 1017.442775] dump_stack+0x107/0x167 [ 1017.443213] should_fail.cold+0x5/0xa [ 1017.443658] ? security_file_alloc+0x34/0x170 [ 1017.444193] should_failslab+0x5/0x20 [ 1017.444647] kmem_cache_alloc+0x5b/0x310 [ 1017.445128] security_file_alloc+0x34/0x170 [ 1017.445632] __alloc_file+0xb7/0x320 [ 1017.446070] alloc_empty_file+0x6d/0x170 [ 1017.446547] path_openat+0xe6/0x2770 [ 1017.446985] ? lock_downgrade+0x6d0/0x6d0 [ 1017.447472] ? path_lookupat+0x860/0x860 [ 1017.447949] ? trace_hardirqs_on+0x5b/0x180 [ 1017.448463] ? kmem_cache_alloc+0x2a6/0x310 [ 1017.448964] ? memcpy+0x39/0x60 [ 1017.449358] do_file_open_root+0x268/0x4e0 [ 1017.449852] ? do_filp_open+0x3e0/0x3e0 [ 1017.450324] ? SOFTIRQ_verbose+0x10/0x10 [ 1017.450806] ? expand_files+0x60a/0xa80 [ 1017.451265] ? find_held_lock+0x2c/0x110 [ 1017.451743] ? alloc_fd+0x2e7/0x670 [ 1017.452177] ? lock_downgrade+0x6d0/0x6d0 [ 1017.452656] ? do_raw_spin_lock+0x121/0x260 [ 1017.453161] file_open_root+0x2b8/0x440 [ 1017.453620] ? vfs_fallocate+0xda0/0xda0 [ 1017.454089] ? alloc_fd+0x2e7/0x670 [ 1017.454528] do_handle_open+0x32f/0x8b0 [ 1017.454993] ? fput_many+0x2f/0x1a0 [ 1017.455410] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.455964] ? ksys_write+0x1a9/0x260 [ 1017.456412] ? __ia32_sys_read+0xb0/0xb0 [ 1017.456886] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.457487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.458084] do_syscall_64+0x33/0x40 [ 1017.458513] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.459105] RIP: 0033:0x7f6222aa9b19 [ 1017.459539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.461676] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.462557] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1017.463384] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.464219] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.465049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.465900] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1017.466747] CPU: 1 PID: 7617 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1017.468216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.469988] Call Trace: [ 1017.470557] dump_stack+0x107/0x167 [ 1017.471341] should_fail.cold+0x5/0xa [ 1017.472178] ? create_object.isra.0+0x3a/0xa30 [ 1017.473159] should_failslab+0x5/0x20 [ 1017.473985] kmem_cache_alloc+0x5b/0x310 [ 1017.474858] ? stack_trace_consume_entry+0x160/0x160 [ 1017.475948] create_object.isra.0+0x3a/0xa30 [ 1017.476903] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1017.477995] kmem_cache_alloc+0x159/0x310 [ 1017.478892] getname_kernel+0x4e/0x370 [ 1017.479736] do_file_open_root+0x14b/0x4e0 [ 1017.480651] ? do_filp_open+0x3e0/0x3e0 [ 1017.481508] ? perf_trace_lock+0xac/0x490 [ 1017.482396] ? SOFTIRQ_verbose+0x10/0x10 [ 1017.483275] ? __lockdep_reset_lock+0x180/0x180 [ 1017.484281] ? find_held_lock+0x2c/0x110 [ 1017.485165] ? expand_files+0x60a/0xa80 [ 1017.486017] ? find_held_lock+0x2c/0x110 [ 1017.486894] ? alloc_fd+0x2e7/0x670 [ 1017.487679] ? lock_downgrade+0x6d0/0x6d0 [ 1017.488578] ? do_raw_spin_lock+0x121/0x260 [ 1017.489510] file_open_root+0x2b8/0x440 [ 1017.490367] ? vfs_fallocate+0xda0/0xda0 [ 1017.491246] ? alloc_fd+0x2e7/0x670 [ 1017.492054] do_handle_open+0x32f/0x8b0 [ 1017.492905] ? fput_many+0x2f/0x1a0 [ 1017.493688] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.494705] ? ksys_write+0x1a9/0x260 [ 1017.495527] ? __ia32_sys_read+0xb0/0xb0 [ 1017.496420] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.497551] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.498658] do_syscall_64+0x33/0x40 [ 1017.499452] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.500554] RIP: 0033:0x7f625797cb19 [ 1017.501353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.505294] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.506918] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1017.508445] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.509963] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.511484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1017.513020] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 04:11:50 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 11) [ 1017.530785] loop2: detected capacity change from 0 to 16776704 [ 1017.537837] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1017.537837] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1017.537837] [ 1017.560427] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1017.562943] EXT4-fs (loop2): get root inode failed [ 1017.563533] EXT4-fs (loop2): mount failed [ 1017.564794] FAULT_INJECTION: forcing a failure. [ 1017.564794] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.566100] CPU: 0 PID: 7627 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1017.566879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1017.567829] Call Trace: [ 1017.568141] dump_stack+0x107/0x167 [ 1017.568559] should_fail.cold+0x5/0xa [ 1017.568995] ? create_object.isra.0+0x3a/0xa30 [ 1017.569517] should_failslab+0x5/0x20 [ 1017.569955] kmem_cache_alloc+0x5b/0x310 [ 1017.570418] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1017.571063] create_object.isra.0+0x3a/0xa30 [ 1017.571562] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1017.572154] kmem_cache_alloc+0x159/0x310 [ 1017.572632] security_file_alloc+0x34/0x170 [ 1017.573125] __alloc_file+0xb7/0x320 [ 1017.573549] alloc_empty_file+0x6d/0x170 [ 1017.574020] path_openat+0xe6/0x2770 [ 1017.574456] ? lock_downgrade+0x6d0/0x6d0 [ 1017.574938] ? path_lookupat+0x860/0x860 [ 1017.575400] ? trace_hardirqs_on+0x5b/0x180 [ 1017.575899] ? kmem_cache_alloc+0x2a6/0x310 [ 1017.576418] ? memcpy+0x39/0x60 [ 1017.576805] do_file_open_root+0x268/0x4e0 [ 1017.577292] ? do_filp_open+0x3e0/0x3e0 [ 1017.577750] ? SOFTIRQ_verbose+0x10/0x10 [ 1017.578229] ? expand_files+0x60a/0xa80 [ 1017.578682] ? find_held_lock+0x2c/0x110 [ 1017.579155] ? alloc_fd+0x2e7/0x670 [ 1017.579572] ? lock_downgrade+0x6d0/0x6d0 [ 1017.580053] ? do_raw_spin_lock+0x121/0x260 [ 1017.580546] file_open_root+0x2b8/0x440 [ 1017.581004] ? vfs_fallocate+0xda0/0xda0 [ 1017.581471] ? alloc_fd+0x2e7/0x670 [ 1017.581898] do_handle_open+0x32f/0x8b0 [ 1017.582349] ? fput_many+0x2f/0x1a0 [ 1017.582764] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1017.583304] ? ksys_write+0x1a9/0x260 [ 1017.583743] ? __ia32_sys_read+0xb0/0xb0 [ 1017.584226] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1017.584836] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1017.585435] do_syscall_64+0x33/0x40 [ 1017.585860] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1017.586443] RIP: 0033:0x7f110c4eeb19 [ 1017.586869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1017.589011] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1017.589884] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1017.590695] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1017.591507] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1017.592330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1017.593149] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 04:12:04 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 7) 04:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:12:04 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 10) 04:12:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0xfffffffc}, 0x14}}, 0x0) 04:12:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x0) 04:12:04 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:12:04 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}], 0x5, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:12:04 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 12) [ 1031.454926] FAULT_INJECTION: forcing a failure. [ 1031.454926] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.457473] CPU: 1 PID: 7634 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1031.458941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.460706] Call Trace: [ 1031.461273] dump_stack+0x107/0x167 [ 1031.462051] should_fail.cold+0x5/0xa [ 1031.462863] ? inode_doinit_use_xattr+0x54/0x350 [ 1031.463868] should_failslab+0x5/0x20 [ 1031.464680] kmem_cache_alloc_trace+0x55/0x320 [ 1031.465666] inode_doinit_use_xattr+0x54/0x350 [ 1031.466648] inode_doinit_with_dentry+0x107e/0x1240 [ 1031.467942] ? selinux_file_lock+0x280/0x280 [ 1031.469187] selinux_d_instantiate+0x23/0x30 [ 1031.470395] security_d_instantiate+0x56/0xe0 [ 1031.471619] __d_instantiate_anon+0x36/0x5d0 [ 1031.472837] __d_obtain_alias+0x11b/0x170 [ 1031.473984] __kernfs_fh_to_dentry+0x148/0x270 [ 1031.475255] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1031.476455] ? drop_caches_sysctl_handler+0x110/0x110 [ 1031.477599] ? kernfs_fh_to_parent+0x40/0x40 [ 1031.478574] ? reconnect_path+0x810/0x810 [ 1031.479485] ? lock_acquire+0x197/0x470 [ 1031.480463] ? find_held_lock+0x2c/0x110 [ 1031.481350] ? __fget_files+0x2cf/0x520 [ 1031.482208] ? lock_downgrade+0x6d0/0x6d0 [ 1031.483119] ? lock_downgrade+0x6d0/0x6d0 [ 1031.484029] ? __fget_files+0x2f8/0x520 [ 1031.484890] ? drop_caches_sysctl_handler+0x110/0x110 [ 1031.486024] exportfs_decode_fh+0x38/0x90 [ 1031.486912] do_handle_open+0x2bb/0x8b0 [ 1031.487785] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1031.488851] ? ksys_write+0x1a9/0x260 [ 1031.489655] ? __ia32_sys_read+0xb0/0xb0 [ 1031.490517] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.491633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.492746] do_syscall_64+0x33/0x40 [ 1031.493532] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.494617] RIP: 0033:0x7f110c4eeb19 [ 1031.495406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.499311] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1031.500926] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1031.502427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1031.503934] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.505446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1031.506948] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 1031.516670] FAULT_INJECTION: forcing a failure. [ 1031.516670] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1031.519711] CPU: 0 PID: 7645 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1031.521365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.523389] Call Trace: [ 1031.524028] dump_stack+0x107/0x167 [ 1031.524927] should_fail.cold+0x5/0xa [ 1031.525864] __alloc_pages_nodemask+0x182/0x600 [ 1031.526985] ? lock_acquire+0x197/0x470 [ 1031.527933] ? lockref_get+0x11/0x50 [ 1031.528838] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1031.530264] ? lock_downgrade+0x6d0/0x6d0 [ 1031.531242] ? do_raw_spin_lock+0x121/0x260 [ 1031.532278] ? rwlock_bug.part.0+0x90/0x90 [ 1031.533278] alloc_pages_current+0x187/0x280 [ 1031.534339] __get_free_pages+0xc/0xa0 [ 1031.535265] inode_doinit_with_dentry+0x8f1/0x1240 [ 1031.536457] ? selinux_file_lock+0x280/0x280 [ 1031.537524] selinux_d_instantiate+0x23/0x30 [ 1031.538567] security_d_instantiate+0x56/0xe0 [ 1031.539643] __d_instantiate_anon+0x36/0x5d0 [ 1031.540716] __d_obtain_alias+0x11b/0x170 [ 1031.541707] __kernfs_fh_to_dentry+0x148/0x270 [ 1031.542801] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1031.543902] ? drop_caches_sysctl_handler+0x110/0x110 [ 1031.545183] ? kernfs_fh_to_parent+0x40/0x40 [ 1031.546235] ? reconnect_path+0x810/0x810 [ 1031.547229] ? lock_acquire+0x197/0x470 [ 1031.548174] ? find_held_lock+0x2c/0x110 [ 1031.549139] ? __fget_files+0x2cf/0x520 [ 1031.550074] ? lock_downgrade+0x6d0/0x6d0 [ 1031.551047] ? lock_downgrade+0x6d0/0x6d0 [ 1031.552033] ? __fget_files+0x2f8/0x520 [ 1031.552975] ? drop_caches_sysctl_handler+0x110/0x110 [ 1031.554190] exportfs_decode_fh+0x38/0x90 [ 1031.555165] do_handle_open+0x2bb/0x8b0 [ 1031.556096] ? fput_many+0x2f/0x1a0 [ 1031.556962] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1031.558063] ? ksys_write+0x1a9/0x260 [ 1031.558953] ? __ia32_sys_read+0xb0/0xb0 [ 1031.559914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.561153] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.562370] do_syscall_64+0x33/0x40 [ 1031.563234] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.564443] RIP: 0033:0x7f625797cb19 [ 1031.565316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.569588] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1031.571348] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1031.573016] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1031.574653] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.576321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1031.577967] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1031.580690] FAULT_INJECTION: forcing a failure. [ 1031.580690] name failslab, interval 1, probability 0, space 0, times 0 [ 1031.581337] loop2: detected capacity change from 0 to 16776704 [ 1031.583315] CPU: 1 PID: 7636 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1031.583336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1031.587952] Call Trace: [ 1031.588534] dump_stack+0x107/0x167 [ 1031.589306] should_fail.cold+0x5/0xa [ 1031.590119] ? getname_kernel+0x4e/0x370 [ 1031.590981] should_failslab+0x5/0x20 [ 1031.591783] kmem_cache_alloc+0x5b/0x310 [ 1031.592663] ? strlen+0x1e/0xa0 [ 1031.593366] getname_kernel+0x4e/0x370 [ 1031.594195] do_file_open_root+0x14b/0x4e0 [ 1031.595087] ? do_filp_open+0x3e0/0x3e0 [ 1031.595939] ? perf_trace_lock+0xac/0x490 [ 1031.596828] ? SOFTIRQ_verbose+0x10/0x10 [ 1031.596921] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 1031.596921] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1031.596921] [ 1031.597691] ? __lockdep_reset_lock+0x180/0x180 [ 1031.597709] ? find_held_lock+0x2c/0x110 [ 1031.597739] ? expand_files+0x60a/0xa80 [ 1031.603964] ? find_held_lock+0x2c/0x110 [ 1031.604839] ? alloc_fd+0x2e7/0x670 [ 1031.605605] ? lock_downgrade+0x6d0/0x6d0 [ 1031.606482] ? do_raw_spin_lock+0x121/0x260 [ 1031.607396] file_open_root+0x2b8/0x440 [ 1031.608248] ? vfs_fallocate+0xda0/0xda0 [ 1031.609114] ? alloc_fd+0x2e7/0x670 [ 1031.609895] do_handle_open+0x32f/0x8b0 [ 1031.610736] ? fput_many+0x2f/0x1a0 [ 1031.611504] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1031.612507] ? ksys_write+0x1a9/0x260 [ 1031.613310] ? __ia32_sys_read+0xb0/0xb0 [ 1031.614171] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1031.615274] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1031.616381] do_syscall_64+0x33/0x40 [ 1031.617169] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1031.618257] RIP: 0033:0x7f6222aa9b19 [ 1031.619040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1031.622921] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1031.624522] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1031.626022] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1031.627527] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1031.629047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1031.630543] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1031.660010] EXT4-fs error (device loop2): ext4_fill_super:4965: inode #2: comm syz-executor.2: iget: special inode unallocated [ 1031.663058] EXT4-fs (loop2): get root inode failed [ 1031.664226] EXT4-fs (loop2): mount failed [ 1031.665251] loop3: detected capacity change from 0 to 16776704 04:12:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 04:12:04 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}], 0x5, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) 04:12:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 13) 04:12:18 executing program 0: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan3\x00'}) 04:12:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 11) 04:12:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 8) 04:12:18 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:12:18 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 04:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:12:18 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}], 0x5, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="7f454c4604400506ff070000000000000300030003000000050100000000000040000000000000000203000000000000fffbffff08003800010004001108070000000060010000000100000001000000010400000000000020000000000000000000000001000000090000000000000007000000000000004546713ce8c29b351205bf4c6d371b56f3cc282081758d7c41704a5878b6b5f940ebcc02604eb46fbd61a6a66e0d511fb2228b888352e576203932ddae3ccee61f1753c70ef0555ef0662f02d0f2905579736d512c1cd29e089a059630c72cd2cc5a06e6f26b3c68bf25fcfcff53a1806de6b61067254ba77e5f5cf29912e89bf9e87f504d54d28739e559e5d139824c7192b0240f9be84d80b7cfe0cfdff859ded0e17aecd16bf202e4f62b63de6c52941e1e95850dd5e4439822b22f556128cc612c49ac05d2741e97f541b90ba1a8ff9fd43baba2ef77943581ea2a727fa9d8433741c7bedbd23ee62634ed3cd0c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7599d426182cef04ebc00000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004100"/2408], 0x968) [ 1045.427130] loop3: detected capacity change from 0 to 16776704 [ 1045.436328] loop2: detected capacity change from 0 to 16776704 [ 1045.442408] FAULT_INJECTION: forcing a failure. [ 1045.442408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1045.445406] CPU: 1 PID: 7671 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1045.446906] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 1045.446906] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1045.446906] [ 1045.446948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.446960] Call Trace: [ 1045.451050] dump_stack+0x107/0x167 [ 1045.451857] should_fail.cold+0x5/0xa [ 1045.452714] __alloc_pages_nodemask+0x182/0x600 [ 1045.453884] ? lock_acquire+0x197/0x470 [ 1045.454754] ? lockref_get+0x11/0x50 [ 1045.455570] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1045.456891] ? lock_downgrade+0x6d0/0x6d0 [ 1045.457777] ? do_raw_spin_lock+0x121/0x260 [ 1045.458677] ? rwlock_bug.part.0+0x90/0x90 [ 1045.459607] alloc_pages_current+0x187/0x280 [ 1045.460559] __get_free_pages+0xc/0xa0 [ 1045.461400] inode_doinit_with_dentry+0x8f1/0x1240 [ 1045.462535] ? selinux_file_lock+0x280/0x280 [ 1045.463617] selinux_d_instantiate+0x23/0x30 [ 1045.464583] security_d_instantiate+0x56/0xe0 [ 1045.465564] __d_instantiate_anon+0x36/0x5d0 [ 1045.466522] __d_obtain_alias+0x11b/0x170 [ 1045.467426] __kernfs_fh_to_dentry+0x148/0x270 [ 1045.468486] exportfs_decode_fh_raw+0x12a/0x7b0 [ 1045.469506] ? drop_caches_sysctl_handler+0x110/0x110 [ 1045.470624] ? kernfs_fh_to_parent+0x40/0x40 [ 1045.471578] ? reconnect_path+0x810/0x810 [ 1045.472491] ? lock_acquire+0x197/0x470 [ 1045.473334] ? find_held_lock+0x2c/0x110 [ 1045.474198] ? __fget_files+0x2cf/0x520 [ 1045.475045] ? lock_downgrade+0x6d0/0x6d0 [ 1045.475931] ? lock_downgrade+0x6d0/0x6d0 [ 1045.476829] ? __fget_files+0x2f8/0x520 [ 1045.477674] ? drop_caches_sysctl_handler+0x110/0x110 [ 1045.478794] exportfs_decode_fh+0x38/0x90 [ 1045.479702] do_handle_open+0x2bb/0x8b0 [ 1045.480577] ? fput_many+0x2f/0x1a0 [ 1045.481376] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1045.482397] ? ksys_write+0x1a9/0x260 [ 1045.483217] ? __ia32_sys_read+0xb0/0xb0 [ 1045.484101] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1045.485385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1045.486627] do_syscall_64+0x33/0x40 [ 1045.487441] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1045.488546] RIP: 0033:0x7f6222aa9b19 [ 1045.489461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1045.493999] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1045.495855] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1045.497562] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1045.499275] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1045.500824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1045.502502] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 04:12:18 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 1045.525510] FAULT_INJECTION: forcing a failure. [ 1045.525510] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.529144] CPU: 1 PID: 7684 Comm: syz-executor.7 Not tainted 5.10.247 #1 [ 1045.530632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.532560] Call Trace: [ 1045.533151] dump_stack+0x107/0x167 [ 1045.533949] should_fail.cold+0x5/0xa [ 1045.534800] ? create_object.isra.0+0x3a/0xa30 [ 1045.535806] should_failslab+0x5/0x20 [ 1045.536658] kmem_cache_alloc+0x5b/0x310 [ 1045.537550] create_object.isra.0+0x3a/0xa30 [ 1045.538505] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1045.539606] kmem_cache_alloc+0x159/0x310 [ 1045.540509] __alloc_file+0x21/0x320 [ 1045.541310] alloc_empty_file+0x6d/0x170 [ 1045.542176] path_openat+0xe6/0x2770 [ 1045.542986] ? lock_downgrade+0x6d0/0x6d0 [ 1045.544064] ? path_lookupat+0x860/0x860 [ 1045.544974] ? trace_hardirqs_on+0x5b/0x180 [ 1045.546087] ? kmem_cache_alloc+0x2a6/0x310 [ 1045.547064] ? memcpy+0x39/0x60 [ 1045.547795] do_file_open_root+0x268/0x4e0 [ 1045.548720] ? do_filp_open+0x3e0/0x3e0 [ 1045.549738] ? SOFTIRQ_verbose+0x10/0x10 [ 1045.550678] ? expand_files+0x60a/0xa80 [ 1045.551534] ? find_held_lock+0x2c/0x110 [ 1045.552410] ? alloc_fd+0x2e7/0x670 [ 1045.553190] ? lock_downgrade+0x6d0/0x6d0 [ 1045.554109] ? do_raw_spin_lock+0x121/0x260 [ 1045.555050] file_open_root+0x2b8/0x440 [ 1045.555927] ? vfs_fallocate+0xda0/0xda0 [ 1045.556833] ? alloc_fd+0x2e7/0x670 [ 1045.557646] do_handle_open+0x32f/0x8b0 [ 1045.558500] ? fput_many+0x2f/0x1a0 [ 1045.559305] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1045.560334] ? ksys_write+0x1a9/0x260 [ 1045.561257] ? __ia32_sys_read+0xb0/0xb0 [ 1045.562135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1045.563472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1045.564667] do_syscall_64+0x33/0x40 [ 1045.565491] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1045.566603] RIP: 0033:0x7f110c4eeb19 [ 1045.567417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1045.571324] RSP: 002b:00007f1109a64188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1045.573153] RAX: ffffffffffffffda RBX: 00007f110c601f60 RCX: 00007f110c4eeb19 [ 1045.574712] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1045.576349] RBP: 00007f1109a641d0 R08: 0000000000000000 R09: 0000000000000000 [ 1045.577862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1045.579463] R13: 00007ffc9f9e4bef R14: 00007f1109a64300 R15: 0000000000022000 [ 1045.588987] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 04:12:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 12) [ 1045.588987] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1045.588987] [ 1045.598977] FAULT_INJECTION: forcing a failure. [ 1045.598977] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.601854] CPU: 1 PID: 7686 Comm: syz-executor.6 Not tainted 5.10.247 #1 [ 1045.603323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.605121] Call Trace: [ 1045.605689] dump_stack+0x107/0x167 [ 1045.606475] should_fail.cold+0x5/0xa [ 1045.607296] ? create_object.isra.0+0x3a/0xa30 [ 1045.608274] should_failslab+0x5/0x20 [ 1045.609088] kmem_cache_alloc+0x5b/0x310 [ 1045.609957] create_object.isra.0+0x3a/0xa30 [ 1045.610916] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1045.612001] kmem_cache_alloc+0x159/0x310 [ 1045.612903] __alloc_file+0x21/0x320 [ 1045.613704] alloc_empty_file+0x6d/0x170 [ 1045.614574] path_openat+0xe6/0x2770 [ 1045.615366] ? lock_downgrade+0x6d0/0x6d0 [ 1045.616275] ? path_lookupat+0x860/0x860 [ 1045.617136] ? trace_hardirqs_on+0x5b/0x180 [ 1045.618062] ? kmem_cache_alloc+0x2a6/0x310 [ 1045.618984] ? memcpy+0x39/0x60 [ 1045.619821] do_file_open_root+0x268/0x4e0 [ 1045.620786] ? do_filp_open+0x3e0/0x3e0 [ 1045.621653] ? SOFTIRQ_verbose+0x10/0x10 [ 1045.622550] ? expand_files+0x60a/0xa80 [ 1045.623551] ? find_held_lock+0x2c/0x110 [ 1045.624525] ? alloc_fd+0x2e7/0x670 [ 1045.625341] ? lock_downgrade+0x6d0/0x6d0 [ 1045.626250] ? do_raw_spin_lock+0x121/0x260 [ 1045.627235] file_open_root+0x2b8/0x440 04:12:18 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) [ 1045.628109] ? vfs_fallocate+0xda0/0xda0 [ 1045.629150] ? alloc_fd+0x2e7/0x670 [ 1045.629672] FAULT_INJECTION: forcing a failure. [ 1045.629672] name failslab, interval 1, probability 0, space 0, times 0 [ 1045.629959] do_handle_open+0x32f/0x8b0 [ 1045.632202] ? fput_many+0x2f/0x1a0 [ 1045.633004] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1045.634035] ? ksys_write+0x1a9/0x260 [ 1045.634894] ? __ia32_sys_read+0xb0/0xb0 [ 1045.635775] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1045.636925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1045.638198] do_syscall_64+0x33/0x40 [ 1045.639007] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1045.640113] RIP: 0033:0x7f625797cb19 [ 1045.640909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1045.644842] RSP: 002b:00007f6254ef2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1045.646483] RAX: ffffffffffffffda RBX: 00007f6257a8ff60 RCX: 00007f625797cb19 [ 1045.648021] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1045.649569] RBP: 00007f6254ef21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1045.651073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1045.652594] R13: 00007fff8d67103f R14: 00007f6254ef2300 R15: 0000000000022000 [ 1045.654156] CPU: 0 PID: 7700 Comm: syz-executor.1 Not tainted 5.10.247 #1 [ 1045.654931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1045.655851] Call Trace: [ 1045.656172] dump_stack+0x107/0x167 [ 1045.656598] should_fail.cold+0x5/0xa [ 1045.657033] ? kernfs_fop_open+0x2b1/0xcc0 [ 1045.657511] should_failslab+0x5/0x20 [ 1045.657941] kmem_cache_alloc_trace+0x55/0x320 [ 1045.658447] kernfs_fop_open+0x2b1/0xcc0 [ 1045.658914] do_dentry_open+0x4b7/0x1090 [ 1045.659378] ? kernfs_notify_workfn+0x550/0x550 [ 1045.659898] ? may_open+0x1e4/0x400 [ 1045.660332] path_openat+0x19ba/0x2770 [ 1045.660804] ? path_lookupat+0x860/0x860 [ 1045.661254] ? trace_hardirqs_on+0x5b/0x180 [ 1045.661734] ? kmem_cache_alloc+0x2a6/0x310 [ 1045.662223] ? memcpy+0x39/0x60 [ 1045.662592] do_file_open_root+0x268/0x4e0 [ 1045.663090] ? do_filp_open+0x3e0/0x3e0 [ 1045.663566] ? SOFTIRQ_verbose+0x10/0x10 [ 1045.664051] ? expand_files+0x60a/0xa80 [ 1045.664502] ? find_held_lock+0x2c/0x110 [ 1045.664956] ? alloc_fd+0x2e7/0x670 [ 1045.665364] ? lock_downgrade+0x6d0/0x6d0 [ 1045.665829] ? do_raw_spin_lock+0x121/0x260 [ 1045.666314] file_open_root+0x2b8/0x440 [ 1045.666754] ? vfs_fallocate+0xda0/0xda0 [ 1045.667231] ? alloc_fd+0x2e7/0x670 [ 1045.667662] do_handle_open+0x32f/0x8b0 [ 1045.668105] ? fput_many+0x2f/0x1a0 [ 1045.668517] ? do_sys_name_to_handle+0x4c0/0x4c0 [ 1045.669042] ? ksys_write+0x1a9/0x260 [ 1045.669471] ? __ia32_sys_read+0xb0/0xb0 [ 1045.669927] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1045.670520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1045.671095] do_syscall_64+0x33/0x40 [ 1045.671508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1045.672080] RIP: 0033:0x7f6222aa9b19 [ 1045.672525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1045.674577] RSP: 002b:00007f622001f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1045.675428] RAX: ffffffffffffffda RBX: 00007f6222bbcf60 RCX: 00007f6222aa9b19 [ 1045.676216] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1045.677015] RBP: 00007f622001f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1045.677804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1045.678593] R13: 00007fff4c5ba8ef R14: 00007f622001f300 R15: 0000000000022000 [ 1045.699076] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 1045.700449] EXT4-fs (loop2): mount failed [ 1045.725448] EXT4-fs (loop3): mounted filesystem without journal. Opts: noacl,,errors=continue 04:12:18 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 9) 04:12:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 14) 04:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) 04:12:18 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x0) (fail_nth: 13) 04:12:18 executing program 3: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000100)={[{@noacl}]}) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x4}}}, 0x22040) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 04:12:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 04:12:18 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000740), r0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x14, r1, 0x1, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 04:12:18 executing program 5: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) syz_io_uring_setup(0x54e5, &(0x7f0000000680), &(0x7f0000fee000/0x1000)=nil, &(0x7f0000fec000/0x14000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000180), 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000580)=""/55, 0x37}, {0x0}], 0x6, 0x8, 0x800) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0xc, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/2408], 0x968) [ 1049.012820] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.734714] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.763474] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.851358] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.867982] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.884259] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.888472] Failed to initialize the IGMP autojoin socket (err -2) [ 1049.923712] Failed to initialize the IGMP autojoin socket (err -2) [ 1050.918617] Bluetooth: hci0: command 0x0409 tx timeout [ 1052.425410] Failed to initialize the IGMP autojoin socket (err -2) [ 1052.896375] Failed to initialize the IGMP autojoin socket (err -2) [ 1052.966631] Bluetooth: hci0: command 0x041b tx timeout [ 1053.138498] Failed to initialize the IGMP autojoin socket (err -2) [ 1053.151165] Failed to initialize the IGMP autojoin socket (err -2) [ 1053.162855] Failed to initialize the IGMP autojoin socket (err -2) [ 1053.215645] Failed to initialize the IGMP autojoin socket (err -2) [ 1053.226613] Failed to initialize the IGMP autojoin socket (err -2) [ 1055.014618] Bluetooth: hci0: command 0x040f tx timeout [ 1055.075503] Failed to initialize the IGMP autojoin socket (err -2) [ 1055.870366] Failed to initialize the IGMP autojoin socket (err -2) [ 1056.147629] Failed to initialize the IGMP autojoin socket (err -2) [ 1056.511865] Failed to initialize the IGMP autojoin socket (err -2) [ 1056.543045] Failed to initialize the IGMP autojoin socket (err -2) [ 1056.576601] Failed to initialize the IGMP autojoin socket (err -2) [ 1056.578302] Failed to initialize the IGMP autojoin socket (err -2) [ 1057.766680] Bluetooth: hci0: command 0x0409 tx timeout [ 1057.793106] Failed to initialize the IGMP autojoin socket (err -2) [ 1058.314209] Failed to initialize the IGMP autojoin socket (err -2) [ 1059.775907] Failed to initialize the IGMP autojoin socket (err -2) [ 1059.815617] Bluetooth: hci0: command 0x041b tx timeout [ 1059.846893] Failed to initialize the IGMP autojoin socket (err -2) [ 1059.848661] Failed to initialize the IGMP autojoin socket (err -2) [ 1059.979483] Failed to initialize the IGMP autojoin socket (err -2) [ 1060.015141] Failed to initialize the IGMP autojoin socket (err -2) [ 1060.609371] Failed to initialize the IGMP autojoin socket (err -2) [ 1061.228269] Failed to initialize the IGMP autojoin socket (err -2) [ 1061.862610] Bluetooth: hci0: command 0x040f tx timeout [ 1062.613091] Failed to initialize the IGMP autojoin socket (err -2) [ 1062.747051] Failed to initialize the IGMP autojoin socket (err -2) [ 1063.072422] Failed to initialize the IGMP autojoin socket (err -2) [ 1063.113837] Failed to initialize the IGMP autojoin socket (err -2) [ 1063.174159] Failed to initialize the IGMP autojoin socket (err -2) [ 1063.199145] Failed to initialize the IGMP autojoin socket (err -2) [ 1064.635163] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.116893] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.244856] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.406605] Bluetooth: hci0: command 0x0409 tx timeout [ 1066.531428] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.556485] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.563113] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.564942] Failed to initialize the IGMP autojoin socket (err -2) [ 1066.591387] Failed to initialize the IGMP autojoin socket (err -2) [ 1068.455639] Bluetooth: hci0: command 0x041b tx timeout [ 1069.207664] Failed to initialize the IGMP autojoin socket (err -2) [ 1069.781287] Failed to initialize the IGMP autojoin socket (err -2) [ 1069.814706] Failed to initialize the IGMP autojoin socket (err -2) [ 1069.965722] Failed to initialize the IGMP autojoin socket (err -2) [ 1070.045638] Failed to initialize the IGMP autojoin socket (err -2) [ 1070.063129] Failed to initialize the IGMP autojoin socket (err -2) [ 1070.091311] Failed to initialize the IGMP autojoin socket (err -2) [ 1070.502610] Bluetooth: hci0: command 0x040f tx timeout [ 1072.200655] Failed to initialize the IGMP autojoin socket (err -2) [ 1072.951929] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.060528] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.123285] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.142696] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.248666] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.270153] Failed to initialize the IGMP autojoin socket (err -2) [ 1073.902971] Failed to initialize the IGMP autojoin socket (err -2) [ 1074.086606] Bluetooth: hci0: command 0x0409 tx timeout [ 1075.783353] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.134732] Bluetooth: hci0: command 0x041b tx timeout [ 1076.316185] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.427901] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.435989] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.477738] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.488253] Failed to initialize the IGMP autojoin socket (err -2) [ 1076.593205] Failed to initialize the IGMP autojoin socket (err -2) [ 1078.182707] Bluetooth: hci0: command 0x040f tx timeout [ 1079.009798] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.159483] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.565601] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.760814] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.766110] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.770109] Failed to initialize the IGMP autojoin socket (err -2) [ 1079.772210] Failed to initialize the IGMP autojoin socket (err -2) 2025/12/23 04:12:52 executor 5 failed 11 times: executor 5: exit status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 16: Device or resource busy) loop exited with status 67 VM DIAGNOSIS: 04:12:53 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=0000000000000000 RCX=ffffffff816463f7 RDX=0000000000000000 RSI=ffffffff816e1f96 RDI=ffffffff84ff9c20 RBP=ffffea0000eb3580 RSP=ffff888020377758 R8 =0000000000000000 R9 =ffffea0000eb3587 R10=0000000000000000 R11=0000000000000001 R12=ffffea0000eb3588 R13=ffff88803994c4d8 R14=dffffc0000000000 R15=00007f9400a9c000 RIP=ffffffff816e1fb1 RFL=00000282 [--S----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f91a2fb46f4 CR3=000000001bb6a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=636578650a3a73656d69742031312064 XMM02=6174732074697865203a3520726f7475 XMM03=203a4c4941465a59530a373620737574 XMM04=45534e5554286c74636f69203a6e7574 XMM05=6528200a64656c696166202946464954 XMM06=20656369766544203a3631206f6e7272 XMM07=7973756220656372756f73657220726f XMM08=2074697865203a3520726f7475636578 XMM09=4941465a59530a373620737574617473 XMM10=5554286c74636f69203a6e7574203a4c XMM11=0a64656c69616620294646495445534e XMM12=69766544203a3631206f6e7272652820 XMM13=6220656372756f73657220726f206563 XMM14=64657469786520706f6f6c0a29797375 XMM15=0a373620737574617473206874697720 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff81473c8d RDX=ffff88800d53cec0 RSI=ffffffff81473cae RDI=0000000000000005 RBP=ffffffff8166977c RSP=ffff888034a4fc00 R8 =0000000000000000 R9 =ffffed1006318600 R10=0000000000000000 R11=0000000000000001 R12=ffff88807ffd7060 R13=ffff88807ffd8000 R14=ffffed1001713eb5 R15=ffffea0000c630c0 RIP=ffffffff8140cd84 RFL=00000093 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055c745e2d4b8 CR3=000000003b586000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ff0000ff000000000000000000000000 XMM02=00000000000000000000ffffffffffff XMM03=00000000000000000000ff00000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=676f6c206d6f74737563000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000