)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:41:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 2) 23:41:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 58) 23:41:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f00000000c0)="000000000020000000000000000000000000000000000000805f347eaf002000010000000000000000000000060000000000000004", 0x35, 0x540}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:41:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x2, 0x0) 23:41:00 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, 0x0, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2451.943145] FAT-fs (loop5): Directory bread(block 6) failed [ 2451.948727] FAT-fs (loop4): Directory bread(block 6) failed [ 2451.952061] kauditd_printk_skb: 30 callbacks suppressed [ 2451.952074] audit: type=1326 audit(1703634060.891:4334): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2451.955261] audit: type=1326 audit(1703634060.892:4335): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2451.957041] FAULT_INJECTION: forcing a failure. [ 2451.957041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2451.960494] CPU: 1 PID: 29059 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2451.961992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2451.962949] FAT-fs (loop4): Directory bread(block 6) failed [ 2451.963793] Call Trace: [ 2451.963817] dump_stack+0x107/0x167 [ 2451.963843] should_fail.cold+0x5/0xa [ 2451.966601] strncpy_from_user+0x34/0x470 [ 2451.967517] getname_flags.part.0+0x95/0x4f0 [ 2451.968474] getname_flags+0x9a/0xe0 [ 2451.968790] FAT-fs (loop4): Directory bread(block 6) failed [ 2451.969287] do_mkdirat+0x8f/0x2b0 [ 2451.970635] FAT-fs (loop4): Directory bread(block 6) failed [ 2451.971864] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2451.971885] ? user_path_create+0xf0/0xf0 [ 2451.971911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2451.974677] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2451.975808] do_syscall_64+0x33/0x40 [ 2451.976601] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2451.977693] RIP: 0033:0x7faa0c94dc27 [ 2451.978487] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.982406] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2451.984047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2451.985566] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2451.987090] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2451.988626] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2451.990148] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2451.999397] audit: type=1326 audit(1703634060.939:4336): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2452.001699] audit: type=1326 audit(1703634060.939:4337): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2452.008450] audit: type=1326 audit(1703634060.939:4338): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:41:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2452.014227] audit: type=1326 audit(1703634060.948:4339): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:41:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x3, 0x0) [ 2452.031818] audit: type=1326 audit(1703634060.970:4340): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2452.036106] audit: type=1326 audit(1703634060.970:4341): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2452.045227] audit: type=1326 audit(1703634060.970:4342): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2452.048092] FAT-fs (loop1): Directory bread(block 6) failed [ 2452.050882] audit: type=1326 audit(1703634060.970:4343): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29055 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2452.059437] FAULT_INJECTION: forcing a failure. [ 2452.059437] name failslab, interval 1, probability 0, space 0, times 0 [ 2452.060699] CPU: 0 PID: 29076 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2452.061409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2452.062329] Call Trace: [ 2452.062624] dump_stack+0x107/0x167 [ 2452.063007] should_fail.cold+0x5/0xa [ 2452.063418] ? create_object.isra.0+0x3a/0xa20 [ 2452.063922] should_failslab+0x5/0x20 [ 2452.064326] kmem_cache_alloc+0x5b/0x310 [ 2452.064755] ? lock_acquire+0x197/0x470 [ 2452.065194] create_object.isra.0+0x3a/0xa20 [ 2452.065660] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2452.066205] kmem_cache_alloc+0x159/0x310 [ 2452.066646] getname_flags.part.0+0x50/0x4f0 [ 2452.067124] getname+0x8e/0xd0 [ 2452.067474] do_sys_openat2+0xf9/0x420 [ 2452.067894] ? build_open_flags+0x6f0/0x6f0 [ 2452.068356] ? wait_for_completion_io+0x270/0x270 [ 2452.068873] ? rcu_read_lock_any_held+0x75/0xa0 [ 2452.069366] ? vfs_write+0x354/0xa70 [ 2452.069777] __x64_sys_creat+0xc9/0x120 [ 2452.070198] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2452.070753] ? __ia32_sys_read+0xb0/0xb0 [ 2452.071185] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2452.071782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2452.072333] ? trace_hardirqs_on+0x5b/0x180 [ 2452.072817] do_syscall_64+0x33/0x40 [ 2452.073211] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2452.073786] RIP: 0033:0x7f4e36d67b19 [ 2452.074185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2452.076229] RSP: 002b:00007f4e342bc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2452.077031] RAX: ffffffffffffffda RBX: 00007f4e36e7b020 RCX: 00007f4e36d67b19 [ 2452.077827] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2452.078618] RBP: 00007f4e342bc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2452.079407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2452.080191] R13: 00007ffebd8becaf R14: 00007f4e342bc300 R15: 0000000000022000 [ 2452.087482] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2452.089216] EXT4-fs (loop0): get root inode failed [ 2452.089789] EXT4-fs (loop0): mount failed [ 2452.090547] FAT-fs (loop5): Directory bread(block 6) failed 23:41:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 59) [ 2452.151846] FAT-fs (loop4): Directory bread(block 6) failed [ 2452.158222] FAT-fs (loop4): Directory bread(block 6) failed [ 2452.160166] FAT-fs (loop4): Directory bread(block 6) failed 23:41:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2452.162199] FAT-fs (loop4): Directory bread(block 6) failed 23:41:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f00000000c0)="000000000020000000000000000000000000000000000000805f347eaf002000010000000000000000000000060000000000000004", 0x35, 0x540}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2452.199186] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2452.201362] FAT-fs (loop1): Filesystem has been set read-only [ 2452.227776] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 23:41:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 3) [ 2452.251359] EXT4-fs (loop0): get root inode failed [ 2452.252616] EXT4-fs (loop0): mount failed [ 2452.294310] FAULT_INJECTION: forcing a failure. [ 2452.294310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.296826] CPU: 1 PID: 29141 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2452.298234] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2452.299948] Call Trace: [ 2452.300494] dump_stack+0x107/0x167 [ 2452.301241] should_fail.cold+0x5/0xa [ 2452.302039] strncpy_from_user+0x34/0x470 [ 2452.302893] getname_flags.part.0+0x95/0x4f0 [ 2452.303799] getname_flags+0x9a/0xe0 [ 2452.304562] do_mkdirat+0x8f/0x2b0 [ 2452.305285] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2452.306382] ? user_path_create+0xf0/0xf0 [ 2452.307240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2452.308319] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2452.309369] do_syscall_64+0x33/0x40 [ 2452.310123] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2452.311164] RIP: 0033:0x7faa0c94dc27 [ 2452.311943] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2452.315694] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2452.317244] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2452.318691] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2452.320160] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2452.321621] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2452.323074] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2452.359446] FAULT_INJECTION: forcing a failure. [ 2452.359446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.361826] CPU: 1 PID: 29178 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2452.363241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2452.364902] Call Trace: [ 2452.365428] dump_stack+0x107/0x167 [ 2452.366160] should_fail.cold+0x5/0xa [ 2452.366923] strncpy_from_user+0x34/0x470 [ 2452.367770] getname_flags.part.0+0x95/0x4f0 [ 2452.368646] getname+0x8e/0xd0 [ 2452.369290] do_sys_openat2+0xf9/0x420 [ 2452.370078] ? build_open_flags+0x6f0/0x6f0 [ 2452.370952] ? wait_for_completion_io+0x270/0x270 [ 2452.371923] ? rcu_read_lock_any_held+0x75/0xa0 [ 2452.372860] ? vfs_write+0x354/0xa70 [ 2452.373614] __x64_sys_creat+0xc9/0x120 [ 2452.374423] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2452.375484] ? __ia32_sys_read+0xb0/0xb0 [ 2452.376309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2452.377398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2452.378427] ? trace_hardirqs_on+0x5b/0x180 [ 2452.379290] do_syscall_64+0x33/0x40 [ 2452.380057] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2452.381076] RIP: 0033:0x7f4e36d67b19 [ 2452.381824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2452.385510] RSP: 002b:00007f4e342dd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2452.387025] RAX: ffffffffffffffda RBX: 00007f4e36e7af60 RCX: 00007f4e36d67b19 [ 2452.388459] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2452.389880] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2452.391295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2452.392732] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 23:41:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:41:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x4, 0x0) 23:41:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:41:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 60) 23:41:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f00000000c0)="000000000020000000000000000000000000000000000000805f347eaf002000010000000000000000000000060000000000000004", 0x35, 0x540}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2468.025623] kauditd_printk_skb: 12 callbacks suppressed [ 2468.025634] audit: type=1326 audit(1703634076.965:4356): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2468.029520] audit: type=1326 audit(1703634076.969:4357): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2468.041813] audit: type=1326 audit(1703634076.972:4358): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2468.047963] audit: type=1326 audit(1703634076.973:4359): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2468.064679] FAULT_INJECTION: forcing a failure. [ 2468.064679] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.068681] CPU: 0 PID: 29206 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2468.070362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.072225] Call Trace: [ 2468.072754] dump_stack+0x107/0x167 [ 2468.073487] should_fail.cold+0x5/0xa [ 2468.074255] ? create_object.isra.0+0x3a/0xa20 [ 2468.075166] should_failslab+0x5/0x20 [ 2468.075931] kmem_cache_alloc+0x5b/0x310 [ 2468.076747] create_object.isra.0+0x3a/0xa20 [ 2468.077630] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2468.078658] kmem_cache_alloc+0x159/0x310 [ 2468.079505] __d_alloc+0x2a/0x990 [ 2468.080240] d_alloc+0x46/0x1c0 [ 2468.080923] __lookup_hash+0xcc/0x190 [ 2468.081696] filename_create+0x186/0x4a0 [ 2468.082517] ? filename_parentat+0x570/0x570 [ 2468.083404] ? getname_flags.part.0+0x1dd/0x4f0 [ 2468.084378] do_mkdirat+0xa2/0x2b0 [ 2468.085095] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2468.086180] ? user_path_create+0xf0/0xf0 [ 2468.087026] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.088098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.089141] do_syscall_64+0x33/0x40 [ 2468.089897] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2468.090933] RIP: 0033:0x7faa0c94dc27 [ 2468.091700] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.095391] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2468.096946] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2468.098392] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2468.099846] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2468.101293] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2468.102739] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2468.121404] audit: type=1326 audit(1703634076.997:4360): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2468.124472] FAT-fs (loop1): Directory bread(block 6) failed 23:41:16 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, 0x0, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:41:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 4) 23:41:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, 0x0, 0x0) [ 2468.147498] FAT-fs (loop5): Directory bread(block 6) failed [ 2468.155172] audit: type=1326 audit(1703634077.045:4361): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2468.170365] FAULT_INJECTION: forcing a failure. [ 2468.170365] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.172910] CPU: 1 PID: 29214 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2468.174647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.176570] Call Trace: [ 2468.177154] dump_stack+0x107/0x167 [ 2468.177964] should_fail.cold+0x5/0xa [ 2468.178809] ? __alloc_file+0x21/0x320 [ 2468.179694] should_failslab+0x5/0x20 [ 2468.180541] kmem_cache_alloc+0x5b/0x310 [ 2468.181451] __alloc_file+0x21/0x320 [ 2468.182283] alloc_empty_file+0x6d/0x170 [ 2468.183186] path_openat+0xe3/0x26e0 [ 2468.184030] ? path_lookupat+0x860/0x860 [ 2468.184940] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2468.186113] ? lock_acquire+0x197/0x470 [ 2468.187015] do_filp_open+0x190/0x3e0 [ 2468.187886] ? may_open_dev+0xf0/0xf0 [ 2468.188748] ? __alloc_fd+0x2b8/0x630 [ 2468.189602] ? lock_downgrade+0x6d0/0x6d0 [ 2468.190534] ? do_raw_spin_lock+0x121/0x260 [ 2468.191502] ? rwlock_bug.part.0+0x90/0x90 [ 2468.192480] ? _raw_spin_unlock+0x1a/0x30 [ 2468.193415] ? __alloc_fd+0x2b8/0x630 [ 2468.194288] do_sys_openat2+0x171/0x420 [ 2468.195189] ? build_open_flags+0x6f0/0x6f0 [ 2468.196184] ? wait_for_completion_io+0x270/0x270 [ 2468.197275] ? rcu_read_lock_any_held+0x75/0xa0 [ 2468.198332] ? vfs_write+0x354/0xa70 [ 2468.199188] __x64_sys_creat+0xc9/0x120 [ 2468.200109] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2468.201245] ? __ia32_sys_read+0xb0/0xb0 [ 2468.202176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.203368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.204478] ? trace_hardirqs_on+0x5b/0x180 [ 2468.205344] do_syscall_64+0x33/0x40 [ 2468.206086] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2468.207105] RIP: 0033:0x7f4e36d67b19 [ 2468.207863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.211592] RSP: 002b:00007f4e342dd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2468.213124] RAX: ffffffffffffffda RBX: 00007f4e36e7af60 RCX: 00007f4e36d67b19 [ 2468.214553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2468.215997] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2468.217436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2468.218884] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 [ 2468.221940] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2468.224680] EXT4-fs (loop0): get root inode failed [ 2468.225769] EXT4-fs (loop0): mount failed [ 2468.227347] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.242888] audit: type=1326 audit(1703634077.046:4362): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2468.257578] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.259344] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.263272] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.281297] audit: type=1326 audit(1703634077.046:4363): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2468.289572] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2468.297526] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2468.308052] audit: type=1326 audit(1703634077.046:4364): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2468.315599] EXT4-fs (loop2): mount failed 23:41:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:41:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:41:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x5, 0x0) [ 2468.366396] audit: type=1326 audit(1703634077.047:4365): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:41:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 61) 23:41:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 5) [ 2468.549808] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.559776] FAT-fs (loop5): Directory bread(block 6) failed [ 2468.563802] FAULT_INJECTION: forcing a failure. [ 2468.563802] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.566062] CPU: 1 PID: 29338 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2468.567452] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.569117] Call Trace: [ 2468.569650] dump_stack+0x107/0x167 [ 2468.570392] should_fail.cold+0x5/0xa [ 2468.571163] ? __d_alloc+0x2a/0x990 [ 2468.571919] should_failslab+0x5/0x20 [ 2468.572687] kmem_cache_alloc+0x5b/0x310 [ 2468.573500] ? __d_lookup+0x3bf/0x760 [ 2468.574270] __d_alloc+0x2a/0x990 [ 2468.574973] d_alloc+0x46/0x1c0 [ 2468.575651] __lookup_hash+0xcc/0x190 [ 2468.576422] filename_create+0x186/0x4a0 [ 2468.577247] ? filename_parentat+0x570/0x570 [ 2468.578131] ? getname_flags.part.0+0x1dd/0x4f0 [ 2468.579072] do_mkdirat+0xa2/0x2b0 [ 2468.579794] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2468.580876] ? user_path_create+0xf0/0xf0 [ 2468.581713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.582761] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.583821] do_syscall_64+0x33/0x40 [ 2468.584566] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2468.585591] RIP: 0033:0x7faa0c94dc27 [ 2468.586336] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.590025] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2468.591556] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2468.592987] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2468.594416] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2468.595858] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2468.597287] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2468.599867] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.601315] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.603050] FAT-fs (loop4): Directory bread(block 6) failed 23:41:17 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2468.677569] FAT-fs (loop1): Directory bread(block 6) failed [ 2468.696100] FAULT_INJECTION: forcing a failure. [ 2468.696100] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.698667] CPU: 0 PID: 29342 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2468.700194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.701912] Call Trace: [ 2468.702465] dump_stack+0x107/0x167 [ 2468.703321] should_fail.cold+0x5/0xa [ 2468.704167] ? create_object.isra.0+0x3a/0xa20 [ 2468.705122] should_failslab+0x5/0x20 [ 2468.705913] kmem_cache_alloc+0x5b/0x310 [ 2468.706762] create_object.isra.0+0x3a/0xa20 [ 2468.707682] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2468.708739] kmem_cache_alloc+0x159/0x310 [ 2468.709598] __alloc_file+0x21/0x320 [ 2468.710373] alloc_empty_file+0x6d/0x170 [ 2468.711205] path_openat+0xe3/0x26e0 [ 2468.711979] ? path_lookupat+0x860/0x860 [ 2468.712807] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2468.713869] ? lock_acquire+0x197/0x470 [ 2468.714688] do_filp_open+0x190/0x3e0 23:41:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2468.715459] ? may_open_dev+0xf0/0xf0 [ 2468.716297] ? __alloc_fd+0x2b8/0x630 [ 2468.717075] ? lock_downgrade+0x6d0/0x6d0 [ 2468.717918] ? do_raw_spin_lock+0x121/0x260 [ 2468.718793] ? rwlock_bug.part.0+0x90/0x90 [ 2468.719673] ? _raw_spin_unlock+0x1a/0x30 [ 2468.720515] ? __alloc_fd+0x2b8/0x630 [ 2468.721297] do_sys_openat2+0x171/0x420 [ 2468.722108] ? build_open_flags+0x6f0/0x6f0 [ 2468.722994] ? wait_for_completion_io+0x270/0x270 [ 2468.723995] ? rcu_read_lock_any_held+0x75/0xa0 [ 2468.724939] ? vfs_write+0x354/0xa70 [ 2468.725704] __x64_sys_creat+0xc9/0x120 [ 2468.726509] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2468.727516] ? __ia32_sys_read+0xb0/0xb0 [ 2468.728350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2468.729418] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2468.730458] ? trace_hardirqs_on+0x5b/0x180 [ 2468.731335] do_syscall_64+0x33/0x40 [ 2468.732106] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2468.733144] RIP: 0033:0x7f4e36d67b19 [ 2468.733904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.737644] RSP: 002b:00007f4e342dd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2468.739193] RAX: ffffffffffffffda RBX: 00007f4e36e7af60 RCX: 00007f4e36d67b19 [ 2468.740653] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2468.742140] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2468.743600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2468.745047] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 23:41:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2468.765642] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2468.777118] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2468.779352] FAT-fs (loop1): Filesystem has been set read-only [ 2468.786111] EXT4-fs (loop0): get root inode failed [ 2468.787179] EXT4-fs (loop0): mount failed 23:41:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x6, 0x0) [ 2468.843275] FAT-fs (loop5): Directory bread(block 6) failed [ 2468.973490] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.977302] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.978889] FAT-fs (loop4): Directory bread(block 6) failed [ 2468.991109] FAT-fs (loop4): Directory bread(block 6) failed 23:41:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 62) 23:41:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:41:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:41:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2486.054455] FAULT_INJECTION: forcing a failure. [ 2486.054455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2486.057243] CPU: 0 PID: 29377 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2486.058654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.060369] Call Trace: [ 2486.060922] dump_stack+0x107/0x167 [ 2486.061670] should_fail.cold+0x5/0xa [ 2486.062446] strncpy_from_user+0x34/0x470 [ 2486.063297] getname_flags.part.0+0x95/0x4f0 [ 2486.064203] getname_flags+0x9a/0xe0 [ 2486.064957] do_mkdirat+0x8f/0x2b0 [ 2486.065684] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 2486.066768] ? user_path_create+0xf0/0xf0 [ 2486.067607] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.068676] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.069707] do_syscall_64+0x33/0x40 [ 2486.070456] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2486.071590] RIP: 0033:0x7faa0c94dc27 [ 2486.072347] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.076033] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2486.077559] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2486.078992] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2486.080495] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2486.081919] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2486.083341] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 23:41:34 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:41:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 6) 23:41:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:41:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x7, 0x0) [ 2486.101471] kauditd_printk_skb: 10 callbacks suppressed [ 2486.101488] audit: type=1326 audit(1703634095.041:4376): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.108440] audit: type=1326 audit(1703634095.041:4377): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.119815] audit: type=1326 audit(1703634095.053:4378): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.140800] audit: type=1326 audit(1703634095.054:4379): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.147631] audit: type=1326 audit(1703634095.055:4380): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.155357] audit: type=1326 audit(1703634095.081:4381): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2486.160267] audit: type=1326 audit(1703634095.081:4382): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2486.162640] FAT-fs (loop5): Directory bread(block 6) failed [ 2486.167614] audit: type=1326 audit(1703634095.081:4383): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2486.179419] audit: type=1326 audit(1703634095.081:4384): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2486.184491] FAT-fs (loop1): Directory bread(block 6) failed [ 2486.186327] audit: type=1326 audit(1703634095.081:4385): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29382 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2486.187678] FAULT_INJECTION: forcing a failure. [ 2486.187678] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.193069] CPU: 1 PID: 29398 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2486.194465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.196195] Call Trace: [ 2486.196731] dump_stack+0x107/0x167 [ 2486.197490] should_fail.cold+0x5/0xa [ 2486.198281] ? security_file_alloc+0x34/0x170 [ 2486.199212] should_failslab+0x5/0x20 [ 2486.199998] kmem_cache_alloc+0x5b/0x310 [ 2486.200843] security_file_alloc+0x34/0x170 [ 2486.201714] __alloc_file+0xb7/0x320 [ 2486.202492] alloc_empty_file+0x6d/0x170 [ 2486.203320] path_openat+0xe3/0x26e0 [ 2486.204112] ? path_lookupat+0x860/0x860 [ 2486.204945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2486.206014] ? lock_acquire+0x197/0x470 [ 2486.206822] do_filp_open+0x190/0x3e0 [ 2486.207590] ? may_open_dev+0xf0/0xf0 [ 2486.208370] ? __alloc_fd+0x2b8/0x630 [ 2486.209140] ? lock_downgrade+0x6d0/0x6d0 [ 2486.209973] ? do_raw_spin_lock+0x121/0x260 [ 2486.210845] ? rwlock_bug.part.0+0x90/0x90 [ 2486.211707] ? _raw_spin_unlock+0x1a/0x30 [ 2486.212550] ? __alloc_fd+0x2b8/0x630 [ 2486.213337] do_sys_openat2+0x171/0x420 [ 2486.214139] ? build_open_flags+0x6f0/0x6f0 [ 2486.215020] ? wait_for_completion_io+0x270/0x270 [ 2486.216015] ? rcu_read_lock_any_held+0x75/0xa0 [ 2486.216951] ? vfs_write+0x354/0xa70 [ 2486.217714] __x64_sys_creat+0xc9/0x120 [ 2486.218520] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2486.219517] ? __ia32_sys_read+0xb0/0xb0 [ 2486.220353] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.221403] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.222439] ? trace_hardirqs_on+0x5b/0x180 [ 2486.223317] do_syscall_64+0x33/0x40 [ 2486.224087] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2486.225121] RIP: 0033:0x7f4e36d67b19 [ 2486.225879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.229577] RSP: 002b:00007f4e342bc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2486.231109] RAX: ffffffffffffffda RBX: 00007f4e36e7b020 RCX: 00007f4e36d67b19 [ 2486.232547] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2486.233975] RBP: 00007f4e342bc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.235401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2486.236843] R13: 00007ffebd8becaf R14: 00007f4e342bc300 R15: 0000000000022000 [ 2486.241034] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.306370] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.309989] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2486.326788] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.331361] EXT4-fs (loop0): get root inode failed [ 2486.332590] EXT4-fs (loop0): mount failed [ 2486.340866] FAT-fs (loop4): Directory bread(block 6) failed 23:41:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 63) 23:41:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x16, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:41:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x8, 0x0) [ 2486.447596] FAULT_INJECTION: forcing a failure. [ 2486.447596] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.449950] CPU: 1 PID: 29484 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2486.451363] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.453153] Call Trace: [ 2486.453778] dump_stack+0x107/0x167 [ 2486.454629] should_fail.cold+0x5/0xa [ 2486.455405] ? ext4_alloc_inode+0x1a/0x670 [ 2486.456311] should_failslab+0x5/0x20 [ 2486.457082] kmem_cache_alloc+0x5b/0x310 [ 2486.457906] ? security_compute_validatetrans.part.0+0x960/0x960 [ 2486.459129] ? ext4_init_journal_params+0x350/0x350 [ 2486.460145] ext4_alloc_inode+0x1a/0x670 [ 2486.460975] ? ext4_init_journal_params+0x350/0x350 [ 2486.461982] alloc_inode+0x63/0x240 [ 2486.462713] new_inode+0x23/0x250 [ 2486.463421] __ext4_new_inode+0x32c/0x5370 [ 2486.464287] ? avc_has_extended_perms+0xf40/0xf40 [ 2486.465289] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2486.466281] ? dquot_initialize_needed+0x290/0x290 [ 2486.467265] ? selinux_determine_inode_label+0x1ab/0x340 [ 2486.468375] ext4_mkdir+0x32c/0xb10 [ 2486.469125] ? ext4_rmdir+0xf70/0xf70 [ 2486.469904] vfs_mkdir+0x493/0x700 [ 2486.470626] do_mkdirat+0x150/0x2b0 [ 2486.471367] ? user_path_create+0xf0/0xf0 [ 2486.472237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.473291] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.474338] do_syscall_64+0x33/0x40 [ 2486.475085] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2486.476120] RIP: 0033:0x7faa0c94dc27 [ 2486.476878] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.480590] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2486.482119] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2486.483556] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2486.485006] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2486.486440] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2486.487888] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 23:41:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 64) 23:41:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 7) 23:41:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2486.648568] FAT-fs (loop5): Directory bread(block 6) failed [ 2486.667191] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2486.673400] FAULT_INJECTION: forcing a failure. [ 2486.673400] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.676334] CPU: 1 PID: 29519 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2486.677733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.679393] Call Trace: [ 2486.679937] dump_stack+0x107/0x167 [ 2486.680680] should_fail.cold+0x5/0xa [ 2486.681450] ? create_object.isra.0+0x3a/0xa20 [ 2486.682374] should_failslab+0x5/0x20 [ 2486.683140] kmem_cache_alloc+0x5b/0x310 [ 2486.683981] create_object.isra.0+0x3a/0xa20 [ 2486.684865] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2486.685893] kmem_cache_alloc+0x159/0x310 [ 2486.686733] security_inode_alloc+0x34/0x160 [ 2486.687619] inode_init_always+0xa4e/0xd10 [ 2486.688475] alloc_inode+0x84/0x240 [ 2486.689200] new_inode+0x23/0x250 [ 2486.689910] __ext4_new_inode+0x32c/0x5370 [ 2486.690762] ? avc_has_extended_perms+0xf40/0xf40 [ 2486.691780] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2486.692759] ? dquot_initialize_needed+0x290/0x290 [ 2486.693742] ? selinux_determine_inode_label+0x1ab/0x340 [ 2486.694849] ext4_mkdir+0x32c/0xb10 [ 2486.695592] ? ext4_rmdir+0xf70/0xf70 [ 2486.696373] vfs_mkdir+0x493/0x700 [ 2486.697095] do_mkdirat+0x150/0x2b0 [ 2486.697836] ? user_path_create+0xf0/0xf0 [ 2486.698683] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.699736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.700785] do_syscall_64+0x33/0x40 [ 2486.701530] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2486.702580] RIP: 0033:0x7faa0c94dc27 [ 2486.703327] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.707012] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2486.708549] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2486.709980] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2486.711410] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2486.712839] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2486.714273] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2486.716435] EXT4-fs (loop0): get root inode failed [ 2486.717547] EXT4-fs (loop0): mount failed [ 2486.720551] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.726207] FAT-fs (loop1): Directory bread(block 6) failed [ 2486.726623] FAT-fs (loop4): Directory bread(block 6) failed 23:41:35 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:41:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2486.730949] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.738424] FAULT_INJECTION: forcing a failure. [ 2486.738424] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.740154] FAT-fs (loop4): Directory bread(block 6) failed [ 2486.740727] CPU: 1 PID: 29522 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2486.743207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2486.744897] Call Trace: [ 2486.745432] dump_stack+0x107/0x167 [ 2486.746182] should_fail.cold+0x5/0xa [ 2486.746948] ? create_object.isra.0+0x3a/0xa20 [ 2486.747897] should_failslab+0x5/0x20 [ 2486.748668] kmem_cache_alloc+0x5b/0x310 [ 2486.749495] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 2486.750599] create_object.isra.0+0x3a/0xa20 [ 2486.751486] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2486.752529] kmem_cache_alloc+0x159/0x310 [ 2486.753371] security_file_alloc+0x34/0x170 [ 2486.754240] __alloc_file+0xb7/0x320 [ 2486.754991] alloc_empty_file+0x6d/0x170 [ 2486.755824] path_openat+0xe3/0x26e0 [ 2486.756585] ? path_lookupat+0x860/0x860 [ 2486.757416] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2486.758465] ? lock_acquire+0x197/0x470 [ 2486.759276] do_filp_open+0x190/0x3e0 [ 2486.760048] ? may_open_dev+0xf0/0xf0 [ 2486.760819] ? __alloc_fd+0x2b8/0x630 [ 2486.761583] ? lock_downgrade+0x6d0/0x6d0 [ 2486.762419] ? do_raw_spin_lock+0x121/0x260 [ 2486.763279] ? rwlock_bug.part.0+0x90/0x90 [ 2486.764162] ? _raw_spin_unlock+0x1a/0x30 [ 2486.764988] ? __alloc_fd+0x2b8/0x630 [ 2486.765763] do_sys_openat2+0x171/0x420 [ 2486.766558] ? build_open_flags+0x6f0/0x6f0 [ 2486.767426] ? wait_for_completion_io+0x270/0x270 [ 2486.768399] ? rcu_read_lock_any_held+0x75/0xa0 [ 2486.769329] ? vfs_write+0x354/0xa70 [ 2486.770081] __x64_sys_creat+0xc9/0x120 [ 2486.770883] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2486.771892] ? __ia32_sys_read+0xb0/0xb0 [ 2486.772715] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2486.773758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2486.774799] ? trace_hardirqs_on+0x5b/0x180 [ 2486.775668] do_syscall_64+0x33/0x40 [ 2486.776425] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2486.777449] RIP: 0033:0x7f4e36d67b19 [ 2486.778201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.781898] RSP: 002b:00007f4e342dd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2486.783428] RAX: ffffffffffffffda RBX: 00007f4e36e7af60 RCX: 00007f4e36d67b19 [ 2486.784862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2486.786291] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.787714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2486.789167] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 [ 2486.847437] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2486.849421] FAT-fs (loop1): Filesystem has been set read-only 23:41:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2486.900156] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2486.916182] FAT-fs (loop5): Directory bread(block 6) failed [ 2486.935031] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2486.963318] EXT4-fs (loop2): mount failed 23:41:52 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:41:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe, 0x0) 23:41:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed}, 0xe) 23:41:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:41:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 8) 23:41:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:41:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x2}, 0xe) 23:41:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 65) [ 2503.433294] kauditd_printk_skb: 35 callbacks suppressed [ 2503.433307] audit: type=1326 audit(1703634112.372:4421): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2503.437452] audit: type=1326 audit(1703634112.373:4422): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2503.443496] audit: type=1326 audit(1703634112.374:4423): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2503.456020] audit: type=1326 audit(1703634112.374:4424): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2503.461044] FAULT_INJECTION: forcing a failure. [ 2503.461044] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.463116] audit: type=1326 audit(1703634112.374:4425): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2503.463515] CPU: 1 PID: 29660 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2503.467300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.469159] Call Trace: [ 2503.469694] dump_stack+0x107/0x167 [ 2503.470464] should_fail.cold+0x5/0xa [ 2503.470654] audit: type=1326 audit(1703634112.377:4426): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2503.471249] ? jbd2__journal_start+0x190/0x7e0 [ 2503.471270] should_failslab+0x5/0x20 [ 2503.471292] kmem_cache_alloc+0x5b/0x310 [ 2503.476357] jbd2__journal_start+0x190/0x7e0 [ 2503.477345] __ext4_journal_start_sb+0x214/0x390 [ 2503.478350] __ext4_new_inode+0x2db9/0x5370 [ 2503.479297] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2503.480373] ? dquot_initialize_needed+0x290/0x290 [ 2503.481455] ? selinux_determine_inode_label+0x1ab/0x340 [ 2503.482629] ext4_mkdir+0x32c/0xb10 [ 2503.483435] ? ext4_rmdir+0xf70/0xf70 [ 2503.484277] vfs_mkdir+0x493/0x700 [ 2503.485110] do_mkdirat+0x150/0x2b0 [ 2503.485915] ? user_path_create+0xf0/0xf0 [ 2503.485961] audit: type=1326 audit(1703634112.377:4427): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2503.486746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.486765] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.486790] do_syscall_64+0x33/0x40 [ 2503.492457] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2503.493719] RIP: 0033:0x7faa0c94dc27 [ 2503.494646] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.499181] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2503.501067] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2503.502419] audit: type=1326 audit(1703634112.377:4428): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2503.502786] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2503.502800] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2503.502812] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2503.502825] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2503.503403] EXT4-fs error (device sda) in __ext4_new_inode:1082: Out of memory [ 2503.515324] FAULT_INJECTION: forcing a failure. [ 2503.515324] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.516987] CPU: 0 PID: 29668 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2503.517803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.518708] Call Trace: [ 2503.519021] dump_stack+0x107/0x167 [ 2503.519435] should_fail.cold+0x5/0xa [ 2503.519883] ? __d_alloc+0x2a/0x990 [ 2503.520291] should_failslab+0x5/0x20 [ 2503.520736] kmem_cache_alloc+0x5b/0x310 [ 2503.521213] __d_alloc+0x2a/0x990 [ 2503.521619] d_alloc_parallel+0x111/0x1bc0 [ 2503.522105] ? __d_lookup+0x396/0x760 [ 2503.522548] ? lock_downgrade+0x6d0/0x6d0 [ 2503.523031] ? find_held_lock+0x2c/0x110 [ 2503.523507] ? __d_lookup_rcu+0x6d0/0x6d0 [ 2503.523995] ? __d_lookup+0x3bf/0x760 [ 2503.524451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.525032] lookup_open.isra.0+0x962/0x1270 [ 2503.525551] ? vfs_tmpfile+0x350/0x350 [ 2503.526018] path_openat+0x96f/0x26e0 [ 2503.526456] ? path_lookupat+0x860/0x860 [ 2503.526932] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2503.527529] ? lock_acquire+0x197/0x470 [ 2503.528007] do_filp_open+0x190/0x3e0 [ 2503.528435] ? may_open_dev+0xf0/0xf0 [ 2503.528895] ? do_raw_spin_lock+0x121/0x260 [ 2503.529403] ? rwlock_bug.part.0+0x90/0x90 [ 2503.529905] ? _raw_spin_unlock+0x1a/0x30 [ 2503.530381] ? __alloc_fd+0x2b8/0x630 [ 2503.530836] do_sys_openat2+0x171/0x420 [ 2503.531308] ? build_open_flags+0x6f0/0x6f0 [ 2503.531815] ? wait_for_completion_io+0x270/0x270 [ 2503.532353] ? rcu_read_lock_any_held+0x75/0xa0 [ 2503.532882] ? vfs_write+0x354/0xa70 [ 2503.533325] __x64_sys_creat+0xc9/0x120 [ 2503.533793] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2503.534383] ? __ia32_sys_read+0xb0/0xb0 [ 2503.534858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.535467] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.536083] ? trace_hardirqs_on+0x5b/0x180 [ 2503.536594] do_syscall_64+0x33/0x40 [ 2503.537030] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2503.537628] RIP: 0033:0x7f4e36d67b19 [ 2503.538072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.540241] RSP: 002b:00007f4e342bc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2503.541127] RAX: ffffffffffffffda RBX: 00007f4e36e7b020 RCX: 00007f4e36d67b19 [ 2503.541976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2503.542804] RBP: 00007f4e342bc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.543643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2503.544476] R13: 00007ffebd8becaf R14: 00007f4e342bc300 R15: 0000000000022000 [ 2503.546783] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.554129] audit: type=1326 audit(1703634112.377:4429): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2503.572937] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.574416] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.578893] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.591807] FAT-fs (loop5): Directory bread(block 6) failed 23:41:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 66) [ 2503.601580] audit: type=1326 audit(1703634112.381:4430): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29645 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2503.607614] FAT-fs (loop1): Directory bread(block 6) failed [ 2503.621237] FAULT_INJECTION: forcing a failure. [ 2503.621237] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.622516] CPU: 0 PID: 29745 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2503.623275] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.624181] Call Trace: [ 2503.624467] dump_stack+0x107/0x167 [ 2503.624869] should_fail.cold+0x5/0xa [ 2503.625292] ? create_object.isra.0+0x3a/0xa20 [ 2503.625791] should_failslab+0x5/0x20 [ 2503.626197] kmem_cache_alloc+0x5b/0x310 [ 2503.626649] create_object.isra.0+0x3a/0xa20 [ 2503.627117] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.627667] kmem_cache_alloc+0x159/0x310 [ 2503.628120] security_inode_alloc+0x34/0x160 [ 2503.628609] inode_init_always+0xa4e/0xd10 [ 2503.629061] alloc_inode+0x84/0x240 [ 2503.629461] new_inode+0x23/0x250 [ 2503.629844] __ext4_new_inode+0x32c/0x5370 23:41:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf, 0x0) [ 2503.630315] ? avc_has_extended_perms+0xf40/0xf40 [ 2503.630981] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2503.631529] ? dquot_initialize_needed+0x290/0x290 [ 2503.632103] ? selinux_determine_inode_label+0x1ab/0x340 [ 2503.632728] ext4_mkdir+0x32c/0xb10 [ 2503.633144] ? ext4_rmdir+0xf70/0xf70 [ 2503.633578] vfs_mkdir+0x493/0x700 [ 2503.633973] do_mkdirat+0x150/0x2b0 [ 2503.634373] ? user_path_create+0xf0/0xf0 [ 2503.634844] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.635430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.636016] do_syscall_64+0x33/0x40 [ 2503.636435] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2503.637010] RIP: 0033:0x7faa0c94dc27 [ 2503.637429] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.639494] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2503.640357] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2503.641153] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2503.641956] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2503.642750] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2503.643555] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2503.645123] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2503.648417] EXT4-fs (loop0): get root inode failed [ 2503.649070] EXT4-fs (loop0): mount failed 23:41:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) 23:41:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:41:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 9) [ 2503.727185] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2503.729203] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2503.738255] EXT4-fs (loop2): mount failed 23:41:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2503.786203] FAT-fs (loop4): Directory bread(block 6) failed 23:41:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 67) 23:41:52 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0xffffffffffffffff, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2503.816167] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.821849] FAT-fs (loop5): Directory bread(block 6) failed [ 2503.825346] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.837072] FAT-fs (loop4): Directory bread(block 6) failed [ 2503.853763] FAT-fs (loop1): Directory bread(block 6) failed 23:41:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2503.870781] FAULT_INJECTION: forcing a failure. [ 2503.870781] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.872352] CPU: 0 PID: 29795 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2503.873095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.873987] Call Trace: [ 2503.874283] dump_stack+0x107/0x167 [ 2503.874675] should_fail.cold+0x5/0xa [ 2503.875098] should_failslab+0x5/0x20 [ 2503.875507] __kmalloc_track_caller+0x79/0x370 [ 2503.876004] ? sidtab_sid2str_get+0x17e/0x720 [ 2503.876538] kmemdup+0x23/0x50 [ 2503.876886] sidtab_sid2str_get+0x17e/0x720 [ 2503.877358] sidtab_entry_to_string+0x33/0x110 [ 2503.877852] security_sid_to_context_core+0x33c/0x5d0 [ 2503.878398] selinux_inode_init_security+0x4ab/0x690 [ 2503.878949] ? selinux_dentry_init_security+0x280/0x280 [ 2503.879522] ? get_cached_acl_rcu+0x120/0x120 [ 2503.880027] ? find_held_lock+0x2c/0x110 [ 2503.880467] security_inode_init_security+0x151/0x360 [ 2503.881048] ? ext4_init_acl+0x310/0x310 [ 2503.881480] ? inode_free_by_rcu+0x20/0x20 [ 2503.881966] ? chksum_update+0x4c/0xb0 [ 2503.882424] __ext4_new_inode+0x3869/0x5370 [ 2503.882926] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2503.883487] ? dquot_initialize_needed+0x290/0x290 [ 2503.884043] ? selinux_determine_inode_label+0x1ab/0x340 [ 2503.884674] ext4_mkdir+0x32c/0xb10 [ 2503.885097] ? ext4_rmdir+0xf70/0xf70 [ 2503.885544] vfs_mkdir+0x493/0x700 [ 2503.885960] do_mkdirat+0x150/0x2b0 [ 2503.886386] ? user_path_create+0xf0/0xf0 [ 2503.886635] FAULT_INJECTION: forcing a failure. [ 2503.886635] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.886865] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.889820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.890415] do_syscall_64+0x33/0x40 [ 2503.890837] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2503.891424] RIP: 0033:0x7faa0c94dc27 [ 2503.891823] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.893920] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2503.894794] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2503.895606] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2503.896422] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2503.897239] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2503.897991] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2503.898824] CPU: 1 PID: 29789 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2503.900328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2503.902105] Call Trace: [ 2503.902675] dump_stack+0x107/0x167 [ 2503.903466] should_fail.cold+0x5/0xa [ 2503.904316] ? create_object.isra.0+0x3a/0xa20 [ 2503.905304] should_failslab+0x5/0x20 [ 2503.906124] kmem_cache_alloc+0x5b/0x310 [ 2503.907005] create_object.isra.0+0x3a/0xa20 [ 2503.907954] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2503.909057] kmem_cache_alloc+0x159/0x310 [ 2503.909960] __d_alloc+0x2a/0x990 [ 2503.910718] d_alloc_parallel+0x111/0x1bc0 [ 2503.911634] ? __d_lookup+0x396/0x760 [ 2503.912472] ? lock_downgrade+0x6d0/0x6d0 [ 2503.913364] ? find_held_lock+0x2c/0x110 [ 2503.914248] ? __d_lookup_rcu+0x6d0/0x6d0 [ 2503.915146] ? __d_lookup+0x3bf/0x760 [ 2503.915974] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.917123] lookup_open.isra.0+0x962/0x1270 [ 2503.918084] ? vfs_tmpfile+0x350/0x350 [ 2503.918960] path_openat+0x96f/0x26e0 [ 2503.919793] ? path_lookupat+0x860/0x860 [ 2503.920679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2503.921807] ? lock_acquire+0x197/0x470 [ 2503.922677] do_filp_open+0x190/0x3e0 [ 2503.923496] ? may_open_dev+0xf0/0xf0 [ 2503.924346] ? do_raw_spin_lock+0x121/0x260 [ 2503.925279] ? rwlock_bug.part.0+0x90/0x90 [ 2503.926202] ? _raw_spin_unlock+0x1a/0x30 [ 2503.927093] ? __alloc_fd+0x2b8/0x630 [ 2503.927927] do_sys_openat2+0x171/0x420 [ 2503.928796] ? build_open_flags+0x6f0/0x6f0 [ 2503.929728] ? wait_for_completion_io+0x270/0x270 [ 2503.930771] ? rcu_read_lock_any_held+0x75/0xa0 [ 2503.931770] ? vfs_write+0x354/0xa70 [ 2503.932598] __x64_sys_creat+0xc9/0x120 [ 2503.933457] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2503.934530] ? __ia32_sys_read+0xb0/0xb0 [ 2503.935411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2503.936547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2503.937654] ? trace_hardirqs_on+0x5b/0x180 [ 2503.938588] do_syscall_64+0x33/0x40 [ 2503.939390] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2503.940512] RIP: 0033:0x7f4e36d67b19 [ 2503.941317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2503.945270] RSP: 002b:00007f4e342dd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2503.946906] RAX: ffffffffffffffda RBX: 00007f4e36e7af60 RCX: 00007f4e36d67b19 [ 2503.948458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2503.949990] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2503.951521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2503.953058] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 [ 2503.964217] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2503.965835] EXT4-fs (loop0): get root inode failed [ 2503.966367] EXT4-fs (loop0): mount failed [ 2503.978791] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2503.981387] FAT-fs (loop1): Filesystem has been set read-only [ 2504.068330] FAT-fs (loop5): Directory bread(block 6) failed [ 2517.796246] FAT-fs (loop1): Directory bread(block 6) failed 23:42:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 68) 23:42:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}, 0xe) 23:42:06 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed}, 0xe) 23:42:06 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0xffffffffffffffff, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 10) 23:42:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:42:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x13, 0x0) [ 2517.824949] kauditd_printk_skb: 30 callbacks suppressed [ 2517.824967] audit: type=1326 audit(1703634126.764:4461): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.831071] audit: type=1326 audit(1703634126.765:4462): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.835659] audit: type=1326 audit(1703634126.775:4463): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.841525] FAT-fs (loop5): Directory bread(block 6) failed [ 2517.855507] audit: type=1326 audit(1703634126.795:4464): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.861695] audit: type=1326 audit(1703634126.795:4465): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.865226] FAULT_INJECTION: forcing a failure. [ 2517.865226] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.868524] CPU: 1 PID: 29933 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2517.869939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2517.871785] Call Trace: [ 2517.872377] dump_stack+0x107/0x167 [ 2517.873124] should_fail.cold+0x5/0xa [ 2517.873820] audit: type=1326 audit(1703634126.800:4466): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2517.873906] should_failslab+0x5/0x20 [ 2517.878460] audit: type=1326 audit(1703634126.801:4467): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2517.878967] __kmalloc_track_caller+0x79/0x370 [ 2517.878987] ? sidtab_sid2str_get+0x17e/0x720 [ 2517.879014] kmemdup+0x23/0x50 [ 2517.883682] audit: type=1326 audit(1703634126.802:4468): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2517.884216] sidtab_sid2str_get+0x17e/0x720 [ 2517.885428] audit: type=1326 audit(1703634126.802:4469): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2517.885754] sidtab_entry_to_string+0x33/0x110 [ 2517.885778] security_sid_to_context_core+0x33c/0x5d0 [ 2517.885804] selinux_inode_init_security+0x4ab/0x690 [ 2517.885830] ? selinux_dentry_init_security+0x280/0x280 [ 2517.890683] audit: type=1326 audit(1703634126.802:4470): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=29923 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2517.891159] ? get_cached_acl_rcu+0x120/0x120 [ 2517.891184] ? find_held_lock+0x2c/0x110 [ 2517.905511] security_inode_init_security+0x151/0x360 [ 2517.906559] ? ext4_init_acl+0x310/0x310 [ 2517.907410] ? inode_free_by_rcu+0x20/0x20 [ 2517.908306] ? chksum_update+0x4c/0xb0 [ 2517.909115] __ext4_new_inode+0x3869/0x5370 [ 2517.910028] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2517.911031] ? dquot_initialize_needed+0x290/0x290 [ 2517.912040] ? selinux_determine_inode_label+0x1ab/0x340 [ 2517.913183] ext4_mkdir+0x32c/0xb10 [ 2517.913947] ? ext4_rmdir+0xf70/0xf70 [ 2517.914737] vfs_mkdir+0x493/0x700 [ 2517.915461] do_mkdirat+0x150/0x2b0 [ 2517.916211] ? user_path_create+0xf0/0xf0 [ 2517.917059] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2517.918129] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2517.919179] do_syscall_64+0x33/0x40 [ 2517.919944] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2517.921009] RIP: 0033:0x7faa0c94dc27 [ 2517.921768] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2517.925510] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2517.927064] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2517.928525] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2517.929976] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2517.931429] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2517.932889] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2517.938311] FAULT_INJECTION: forcing a failure. [ 2517.938311] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.940711] CPU: 1 PID: 29938 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2517.942129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2517.943813] Call Trace: [ 2517.944361] dump_stack+0x107/0x167 [ 2517.945120] should_fail.cold+0x5/0xa [ 2517.945905] ? fat_parse_long.constprop.0+0x8e9/0xb50 [ 2517.946952] should_failslab+0x5/0x20 [ 2517.947740] kmem_cache_alloc+0x5b/0x310 [ 2517.948587] fat_parse_long.constprop.0+0x8e9/0xb50 [ 2517.949620] ? vfat_lookup+0xeb/0x610 [ 2517.950409] fat_search_long+0x380/0xd90 [ 2517.951251] ? fat_parse_short+0xd30/0xd30 [ 2517.952115] ? vfat_lookup+0xeb/0x610 [ 2517.952930] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 2517.953894] ? selinux_determine_inode_label+0x1ab/0x340 [ 2517.955015] vfat_lookup+0x2d4/0x610 [ 2517.955781] ? vfat_revalidate+0x190/0x190 [ 2517.956678] lookup_open.isra.0+0x79f/0x1270 [ 2517.957587] ? vfs_tmpfile+0x350/0x350 [ 2517.958424] path_openat+0x96f/0x26e0 [ 2517.959219] ? path_lookupat+0x860/0x860 [ 2517.960057] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2517.961139] ? lock_acquire+0x197/0x470 [ 2517.961967] do_filp_open+0x190/0x3e0 [ 2517.962748] ? may_open_dev+0xf0/0xf0 [ 2517.963543] ? do_raw_spin_lock+0x121/0x260 [ 2517.964448] ? rwlock_bug.part.0+0x90/0x90 [ 2517.965329] ? _raw_spin_unlock+0x1a/0x30 [ 2517.966179] ? __alloc_fd+0x2b8/0x630 [ 2517.966994] do_sys_openat2+0x171/0x420 [ 2517.967889] ? build_open_flags+0x6f0/0x6f0 [ 2517.968781] ? wait_for_completion_io+0x270/0x270 [ 2517.969761] ? rcu_read_lock_any_held+0x75/0xa0 [ 2517.970841] ? vfs_write+0x354/0xa70 [ 2517.971611] __x64_sys_creat+0xc9/0x120 [ 2517.972522] ? __ia32_compat_sys_openat+0x1f0/0x1f0 [ 2517.973609] ? __ia32_sys_read+0xb0/0xb0 [ 2517.974562] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2517.975632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2517.976764] ? trace_hardirqs_on+0x5b/0x180 [ 2517.977657] do_syscall_64+0x33/0x40 [ 2517.978412] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2517.979570] RIP: 0033:0x7f4e36d67b19 [ 2517.980349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2517.984349] RSP: 002b:00007f4e342bc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2517.986007] RAX: ffffffffffffffda RBX: 00007f4e36e7b020 RCX: 00007f4e36d67b19 [ 2517.987451] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 2517.989003] RBP: 00007f4e342bc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2517.990599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2517.992115] R13: 00007ffebd8becaf R14: 00007f4e342bc300 R15: 0000000000022000 [ 2518.000340] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2518.007987] EXT4-fs (loop0): get root inode failed [ 2518.009100] EXT4-fs (loop0): mount failed [ 2518.045791] FAT-fs (loop4): Directory bread(block 6) failed 23:42:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) (fail_nth: 11) [ 2518.093015] FAT-fs (loop4): Directory bread(block 6) failed [ 2518.126106] FAULT_INJECTION: forcing a failure. [ 2518.126106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2518.128777] CPU: 1 PID: 30003 Comm: syz-executor.1 Not tainted 5.10.205 #1 [ 2518.130193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2518.131901] Call Trace: [ 2518.132450] dump_stack+0x107/0x167 [ 2518.133208] should_fail.cold+0x5/0xa [ 2518.134006] _copy_from_user+0x2e/0x1b0 [ 2518.134847] kstrtouint_from_user+0xbd/0x220 [ 2518.135934] ? kstrtou8_from_user+0x210/0x210 [ 2518.137050] ? lock_acquire+0x197/0x470 [ 2518.137952] ? ksys_write+0x12d/0x260 [ 2518.138750] proc_fail_nth_write+0x78/0x220 [ 2518.139626] ? proc_task_getattr+0x1f0/0x1f0 [ 2518.140542] ? __fget_files+0x296/0x4c0 [ 2518.141365] ? proc_task_getattr+0x1f0/0x1f0 [ 2518.142269] vfs_write+0x29a/0xa70 [ 2518.142999] ksys_write+0x12d/0x260 [ 2518.143750] ? __ia32_sys_read+0xb0/0xb0 [ 2518.144596] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2518.145672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2518.146734] do_syscall_64+0x33/0x40 [ 2518.147606] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2518.148873] RIP: 0033:0x7f4e36d1a5ff [ 2518.149635] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2518.153531] RSP: 002b:00007f4e342dd170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2518.155198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e36d1a5ff [ 2518.156865] RDX: 0000000000000001 RSI: 00007f4e342dd1e0 RDI: 0000000000000003 [ 2518.158321] RBP: 00007f4e342dd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2518.159861] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2518.161313] R13: 00007ffebd8becaf R14: 00007f4e342dd300 R15: 0000000000022000 23:42:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 69) 23:42:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x18, 0x0) 23:42:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2518.289298] FAULT_INJECTION: forcing a failure. [ 2518.289298] name failslab, interval 1, probability 0, space 0, times 0 [ 2518.291660] CPU: 1 PID: 30046 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2518.293091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2518.294798] Call Trace: [ 2518.295338] dump_stack+0x107/0x167 [ 2518.296087] should_fail.cold+0x5/0xa [ 2518.296880] ? create_object.isra.0+0x3a/0xa20 [ 2518.297825] should_failslab+0x5/0x20 [ 2518.298600] kmem_cache_alloc+0x5b/0x310 [ 2518.299449] create_object.isra.0+0x3a/0xa20 [ 2518.300362] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2518.301398] kmem_cache_alloc+0x159/0x310 [ 2518.302249] jbd2__journal_start+0x190/0x7e0 [ 2518.303151] __ext4_journal_start_sb+0x214/0x390 [ 2518.304121] __ext4_new_inode+0x2db9/0x5370 [ 2518.305028] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2518.306023] ? dquot_initialize_needed+0x290/0x290 [ 2518.307019] ? selinux_determine_inode_label+0x1ab/0x340 [ 2518.308128] ext4_mkdir+0x32c/0xb10 [ 2518.308888] ? ext4_rmdir+0xf70/0xf70 [ 2518.309670] vfs_mkdir+0x493/0x700 [ 2518.310397] do_mkdirat+0x150/0x2b0 [ 2518.311139] ? user_path_create+0xf0/0xf0 [ 2518.311986] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2518.313068] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2518.314142] do_syscall_64+0x33/0x40 [ 2518.314908] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2518.315955] RIP: 0033:0x7faa0c94dc27 [ 2518.316724] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2518.320587] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2518.322131] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2518.323580] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2518.325241] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2518.326716] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2518.328205] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2518.351660] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2518.354220] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2518.359633] EXT4-fs (loop2): mount failed [ 2518.370144] FAT-fs (loop5): Directory bread(block 6) failed [ 2518.373786] FAT-fs (loop4): Directory bread(block 6) failed [ 2518.393295] FAT-fs (loop4): Directory bread(block 6) failed [ 2518.408000] FAT-fs (loop4): Directory bread(block 6) failed [ 2518.410552] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2518.417563] EXT4-fs (loop0): get root inode failed [ 2518.418762] EXT4-fs (loop0): mount failed [ 2518.426383] FAT-fs (loop4): Directory bread(block 6) failed 23:42:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:42:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed}, 0xe) 23:42:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:42:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x300}, 0xe) 23:42:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 70) 23:42:23 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0xffffffffffffffff, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf0, 0x0) [ 2534.734178] kauditd_printk_skb: 11 callbacks suppressed [ 2534.734199] audit: type=1326 audit(1703634143.674:4482): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2534.754096] audit: type=1326 audit(1703634143.674:4483): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2534.763958] FAT-fs (loop4): Directory bread(block 6) failed [ 2534.778301] audit: type=1326 audit(1703634143.676:4484): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2534.787857] FAULT_INJECTION: forcing a failure. [ 2534.787857] name failslab, interval 1, probability 0, space 0, times 0 [ 2534.790885] CPU: 1 PID: 30084 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2534.792485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2534.793850] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2534.794156] Call Trace: [ 2534.796984] dump_stack+0x107/0x167 [ 2534.797730] should_fail.cold+0x5/0xa [ 2534.797867] audit: type=1326 audit(1703634143.682:4485): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2534.798510] ? create_object.isra.0+0x3a/0xa20 [ 2534.803623] should_failslab+0x5/0x20 [ 2534.804405] kmem_cache_alloc+0x5b/0x310 [ 2534.804574] EXT4-fs (loop0): get root inode failed [ 2534.805239] create_object.isra.0+0x3a/0xa20 [ 2534.805259] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.805284] __kmalloc+0x16e/0x390 [ 2534.806355] EXT4-fs (loop0): mount failed [ 2534.807179] ext4_find_extent+0xa3d/0xd30 [ 2534.807212] ext4_ext_map_blocks+0x1c8/0x5850 [ 2534.809608] audit: type=1326 audit(1703634143.686:4486): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2534.809824] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2534.809847] ? trace_hardirqs_on+0x5b/0x180 [ 2534.817787] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2534.818857] ? ext4_ext_release+0x10/0x10 [ 2534.819709] ? lock_release+0x680/0x680 [ 2534.820538] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2534.821496] ? lock_downgrade+0x6d0/0x6d0 [ 2534.822356] ? down_read+0x10f/0x430 [ 2534.823110] ? down_write+0x160/0x160 [ 2534.823879] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2534.824838] ext4_map_blocks+0x9cc/0x1940 [ 2534.825691] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2534.826596] ? __brelse+0x84/0xa0 [ 2534.827298] ? __ext4_new_inode+0x148/0x5370 [ 2534.828200] ext4_append+0x1b8/0x4e0 [ 2534.828976] ? ext4_move_extents+0x3270/0x3270 [ 2534.829903] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2534.830890] ext4_init_new_dir+0x25e/0x4d0 [ 2534.831748] ? ext4_init_dot_dotdot+0x610/0x610 [ 2534.832715] ext4_mkdir+0x3c1/0xb10 [ 2534.833460] ? ext4_rmdir+0xf70/0xf70 [ 2534.834245] vfs_mkdir+0x493/0x700 [ 2534.834969] do_mkdirat+0x150/0x2b0 [ 2534.835709] ? user_path_create+0xf0/0xf0 [ 2534.836559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2534.837617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2534.838668] do_syscall_64+0x33/0x40 [ 2534.839419] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2534.840474] RIP: 0033:0x7faa0c94dc27 [ 2534.841237] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2534.844972] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2534.846510] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2534.847953] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2534.849408] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2534.850851] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2534.852294] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2534.858805] audit: type=1326 audit(1703634143.686:4487): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2534.865585] FAT-fs (loop5): Directory bread(block 6) failed [ 2534.869511] FAT-fs (loop4): Directory bread(block 6) failed [ 2534.870944] FAT-fs (loop4): Directory bread(block 6) failed [ 2534.884770] FAT-fs (loop4): Directory bread(block 6) failed [ 2534.911972] FAT-fs (loop4): Directory bread(block 6) failed [ 2534.921190] FAT-fs (loop1): Directory bread(block 6) failed [ 2534.935333] audit: type=1326 audit(1703634143.691:4488): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2534.966922] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2534.973428] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2534.978617] EXT4-fs (loop2): mount failed [ 2534.994503] audit: type=1326 audit(1703634143.691:4489): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2535.036257] audit: type=1326 audit(1703634143.691:4490): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 71) 23:42:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x2) [ 2535.073611] audit: type=1326 audit(1703634143.694:4491): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30069 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:24 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:24 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x300, 0x0) [ 2535.179734] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2535.191826] EXT4-fs (loop0): get root inode failed [ 2535.193199] EXT4-fs (loop0): mount failed [ 2535.195949] FAT-fs (loop5): Directory bread(block 6) failed [ 2535.196062] FAULT_INJECTION: forcing a failure. [ 2535.196062] name failslab, interval 1, probability 0, space 0, times 0 [ 2535.199965] CPU: 1 PID: 30209 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2535.201376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2535.203085] Call Trace: [ 2535.203633] dump_stack+0x107/0x167 [ 2535.204419] should_fail.cold+0x5/0xa [ 2535.205210] ? __es_insert_extent+0xed1/0x1370 [ 2535.206141] should_failslab+0x5/0x20 [ 2535.206920] kmem_cache_alloc+0x5b/0x310 [ 2535.207764] __es_insert_extent+0xed1/0x1370 [ 2535.208679] ? do_raw_read_unlock+0x70/0x70 [ 2535.209559] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2535.210642] ext4_es_insert_extent+0x45d/0xf10 [ 2535.211588] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 2535.212476] ? ext4_es_find_extent_range+0x13b/0x3b0 [ 2535.213515] ? lock_downgrade+0x6d0/0x6d0 [ 2535.214348] ? __ext4_handle_dirty_super+0x100/0x100 [ 2535.215372] ? __es_find_extent_range+0x197/0x4b0 [ 2535.216350] ? do_raw_read_unlock+0x3b/0x70 [ 2535.217252] ext4_ext_map_blocks+0x1852/0x5850 [ 2535.218191] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2535.219251] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2535.220321] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 2535.221389] ? ext4_ext_release+0x10/0x10 [ 2535.222245] ? lock_release+0x680/0x680 [ 2535.223056] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2535.224015] ? lock_downgrade+0x6d0/0x6d0 [ 2535.224894] ? down_read+0x10f/0x430 [ 2535.225651] ? down_write+0x160/0x160 [ 2535.226423] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2535.227379] ext4_map_blocks+0x9cc/0x1940 [ 2535.228226] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2535.229138] ? __brelse+0x84/0xa0 [ 2535.229846] ? __ext4_new_inode+0x148/0x5370 [ 2535.230747] ext4_append+0x1b8/0x4e0 [ 2535.231497] ? ext4_move_extents+0x3270/0x3270 [ 2535.232418] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2535.233401] ext4_init_new_dir+0x25e/0x4d0 [ 2535.234257] ? ext4_init_dot_dotdot+0x610/0x610 [ 2535.235204] ext4_mkdir+0x3c1/0xb10 [ 2535.235943] ? ext4_rmdir+0xf70/0xf70 [ 2535.236740] vfs_mkdir+0x493/0x700 [ 2535.237466] do_mkdirat+0x150/0x2b0 [ 2535.238204] ? user_path_create+0xf0/0xf0 [ 2535.239046] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2535.240094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2535.241141] do_syscall_64+0x33/0x40 [ 2535.241888] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2535.242917] RIP: 0033:0x7faa0c94dc27 [ 2535.243687] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2535.247815] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2535.249575] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2535.251198] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2535.252795] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2535.254385] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2535.255968] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2535.269846] FAT-fs (loop1): Directory bread(block 6) failed [ 2535.306071] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2535.312412] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2535.330864] EXT4-fs (loop2): mount failed [ 2535.349272] FAT-fs (loop4): Directory bread(block 6) failed [ 2535.371657] FAT-fs (loop4): Directory bread(block 6) failed [ 2535.388251] FAT-fs (loop4): Directory bread(block 6) failed [ 2535.390004] FAT-fs (loop4): Directory bread(block 6) failed 23:42:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x78, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2535.493510] FAT-fs (loop5): Directory bread(block 6) failed 23:42:37 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x4) 23:42:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:42:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 72) 23:42:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x500, 0x0) 23:42:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf0, 0x0) 23:42:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2548.865839] kauditd_printk_skb: 26 callbacks suppressed [ 2548.865859] audit: type=1326 audit(1703634157.805:4518): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2548.879879] audit: type=1326 audit(1703634157.805:4519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2548.898111] FAULT_INJECTION: forcing a failure. [ 2548.898111] name failslab, interval 1, probability 0, space 0, times 0 [ 2548.900403] CPU: 0 PID: 30337 Comm: syz-executor.2 Not tainted 5.10.205 #1 [ 2548.901901] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2548.903538] Call Trace: [ 2548.904066] dump_stack+0x107/0x167 [ 2548.904801] should_fail.cold+0x5/0xa [ 2548.905558] ? ext4_find_extent+0xa3d/0xd30 [ 2548.906403] should_failslab+0x5/0x20 [ 2548.907148] __kmalloc+0x72/0x390 [ 2548.907842] ext4_find_extent+0xa3d/0xd30 [ 2548.908675] ext4_ext_map_blocks+0x1c8/0x5850 [ 2548.909575] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2548.910598] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2548.911633] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 2548.912685] ? ext4_ext_release+0x10/0x10 [ 2548.913512] ? lock_release+0x680/0x680 [ 2548.914296] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 2548.915223] ? lock_downgrade+0x6d0/0x6d0 [ 2548.916052] ? down_read+0x10f/0x430 [ 2548.916798] ? down_write+0x160/0x160 [ 2548.917541] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 2548.918459] ext4_map_blocks+0x9cc/0x1940 [ 2548.919288] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 2548.920163] ? __brelse+0x84/0xa0 [ 2548.920863] ? __ext4_new_inode+0x148/0x5370 [ 2548.921736] ext4_append+0x1b8/0x4e0 [ 2548.922469] ? ext4_move_extents+0x3270/0x3270 [ 2548.923367] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 2548.924327] ext4_init_new_dir+0x25e/0x4d0 [ 2548.925179] ? ext4_init_dot_dotdot+0x610/0x610 [ 2548.926103] ext4_mkdir+0x3c1/0xb10 [ 2548.926835] ? ext4_rmdir+0xf70/0xf70 [ 2548.927593] vfs_mkdir+0x493/0x700 [ 2548.928290] do_mkdirat+0x150/0x2b0 [ 2548.929021] ? user_path_create+0xf0/0xf0 [ 2548.929846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2548.930877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2548.931903] do_syscall_64+0x33/0x40 [ 2548.932635] audit: type=1326 audit(1703634157.812:4520): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2548.936878] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2548.937537] audit: type=1326 audit(1703634157.812:4521): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2548.937876] RIP: 0033:0x7faa0c94dc27 [ 2548.937898] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2548.937909] RSP: 002b:00007faa09ec3fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2548.937939] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007faa0c94dc27 [ 2548.949253] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2548.950648] RBP: 00007faa09ec4040 R08: 0000000000000000 R09: ffffffffffffffff [ 2548.952029] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2548.953445] R13: 0000000020000100 R14: 00007faa09ec4000 R15: 0000000020014100 [ 2548.964057] FAT-fs (loop6): Directory bread(block 6) failed [ 2548.967631] FAT-fs (loop1): Directory bread(block 6) failed [ 2548.969359] FAT-fs (loop5): Directory bread(block 6) failed [ 2548.972171] FAT-fs (loop4): Directory bread(block 6) failed [ 2548.985575] audit: type=1326 audit(1703634157.815:4522): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2548.988074] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2549.000213] EXT4-fs (loop0): get root inode failed [ 2549.000306] audit: type=1326 audit(1703634157.816:4523): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2549.001325] EXT4-fs (loop0): mount failed [ 2549.016937] audit: type=1326 audit(1703634157.816:4524): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2549.032543] audit: type=1326 audit(1703634157.826:4525): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x5) [ 2549.051118] audit: type=1326 audit(1703634157.832:4526): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:42:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x102, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2549.064358] audit: type=1326 audit(1703634157.832:4527): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30333 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2549.099604] FAT-fs (loop4): Directory bread(block 6) failed 23:42:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) (fail_nth: 73) 23:42:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x600, 0x0) 23:42:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:42:38 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2549.305875] FAT-fs (loop1): Directory bread(block 6) failed 23:42:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2549.378037] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2549.386904] EXT4-fs (loop0): get root inode failed [ 2549.388193] EXT4-fs (loop0): mount failed 23:42:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:42:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x6) [ 2549.467241] FAT-fs (loop4): Directory bread(block 6) failed 23:42:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x112, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2549.495280] FAT-fs (loop4): Directory bread(block 6) failed [ 2549.512518] FAT-fs (loop4): Directory bread(block 6) failed [ 2549.523034] FAT-fs (loop4): Directory bread(block 6) failed 23:42:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca4", 0x8, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2549.532584] FAT-fs (loop1): Directory bread(block 6) failed [ 2549.555354] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2549.565061] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2549.567278] FAT-fs (loop1): Filesystem has been set read-only [ 2549.576658] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2549.601260] EXT4-fs (loop2): mount failed [ 2549.635793] FAT-fs (loop5): Directory bread(block 6) failed [ 2549.639501] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2549.657797] EXT4-fs (loop0): get root inode failed [ 2549.658986] EXT4-fs (loop0): mount failed 23:42:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) (fail_nth: 1) 23:42:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x700, 0x0) 23:42:56 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x201, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:42:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x8) 23:42:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x2}, 0xe) 23:42:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:42:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca4", 0x8, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2567.802782] kauditd_printk_skb: 32 callbacks suppressed [ 2567.802793] audit: type=1326 audit(1703634176.742:4560): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2567.806368] audit: type=1326 audit(1703634176.742:4561): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2567.811070] audit: type=1326 audit(1703634176.743:4562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2567.814907] FAT-fs (loop4): Directory bread(block 6) failed [ 2567.817783] audit: type=1326 audit(1703634176.754:4563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2567.821750] audit: type=1326 audit(1703634176.755:4564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2567.826269] audit: type=1326 audit(1703634176.755:4565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2567.831206] audit: type=1326 audit(1703634176.755:4566): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2567.835703] audit: type=1326 audit(1703634176.756:4567): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2567.840777] FAT-fs (loop4): Directory bread(block 6) failed [ 2567.841605] FAT-fs (loop4): Directory bread(block 6) failed [ 2567.844099] FAT-fs (loop4): Directory bread(block 6) failed [ 2567.845621] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 2567.846902] audit: type=1326 audit(1703634176.756:4568): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2567.851742] audit: type=1326 audit(1703634176.756:4569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30613 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2567.858555] FAT-fs (loop5): Directory bread(block 6) failed [ 2567.859806] FAT-fs (loop1): Directory bread(block 6) failed [ 2567.870404] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2567.871421] FAT-fs (loop1): Filesystem has been set read-only [ 2567.892543] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 2567.907416] FAULT_INJECTION: forcing a failure. [ 2567.907416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2567.909896] CPU: 1 PID: 30638 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 2567.911304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2567.913001] Call Trace: [ 2567.913537] dump_stack+0x107/0x167 23:42:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x170, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2567.914276] should_fail.cold+0x5/0xa [ 2567.915218] _copy_from_user+0x2e/0x1b0 [ 2567.916036] move_addr_to_kernel.part.0+0x31/0x110 [ 2567.917043] __sys_connect+0xda/0x1a0 [ 2567.917816] ? __sys_connect_file+0x1a0/0x1a0 [ 2567.918731] ? rcu_read_lock_any_held+0x75/0xa0 [ 2567.919672] ? vfs_write+0x354/0xa70 [ 2567.920434] ? fput_many+0x2f/0x1a0 [ 2567.921189] ? ksys_write+0x1a9/0x260 [ 2567.921974] ? __ia32_sys_read+0xb0/0xb0 [ 2567.922803] __x64_sys_connect+0x6f/0xb0 [ 2567.923644] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2567.924689] do_syscall_64+0x33/0x40 [ 2567.925473] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2567.926511] RIP: 0033:0x7fd65359ab19 [ 2567.927275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2567.931018] RSP: 002b:00007fd650aef188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 2567.932547] RAX: ffffffffffffffda RBX: 00007fd6536ae020 RCX: 00007fd65359ab19 [ 2567.933982] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000007 [ 2567.935520] RBP: 00007fd650aef1d0 R08: 0000000000000000 R09: 0000000000000000 23:42:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2567.936968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:42:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xc) [ 2567.938485] R13: 00007ffeb3e39bcf R14: 00007fd650aef300 R15: 0000000000022000 [ 2567.945322] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2567.948030] EXT4-fs (loop0): get root inode failed [ 2567.949084] EXT4-fs (loop0): mount failed 23:42:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe00, 0x0) [ 2567.980339] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) 23:42:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca4", 0x8, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2568.052097] FAT-fs (loop1): Directory bread(block 6) failed [ 2568.057132] FAT-fs (loop5): Directory bread(block 6) failed [ 2568.066337] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (8 blocks) [ 2568.076538] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2568.078480] FAT-fs (loop1): Filesystem has been set read-only [ 2568.086546] FAT-fs (loop4): Directory bread(block 6) failed [ 2568.104572] FAT-fs (loop4): Directory bread(block 6) failed [ 2568.106255] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2568.107723] EXT4-fs (loop0): get root inode failed [ 2568.108249] EXT4-fs (loop0): mount failed [ 2568.118187] FAT-fs (loop4): Directory bread(block 6) failed 23:42:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x291, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2568.136374] FAT-fs (loop4): Directory bread(block 6) failed 23:42:57 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:42:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x12) [ 2568.212213] FAT-fs (loop5): Directory bread(block 6) failed 23:43:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:43:11 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, 0x0, 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:43:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x18) 23:43:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46b", 0x9, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:43:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x3}, 0xe) 23:43:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) (fail_nth: 2) 23:43:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x29c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf00, 0x0) [ 2582.958967] kauditd_printk_skb: 34 callbacks suppressed [ 2582.958985] audit: type=1326 audit(1703634191.899:4604): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2582.959900] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2582.960257] audit: type=1326 audit(1703634191.899:4605): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2582.963372] EXT4-fs (loop0): get root inode failed [ 2582.968269] EXT4-fs (loop0): mount failed [ 2582.976919] audit: type=1326 audit(1703634191.911:4606): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2582.979872] audit: type=1326 audit(1703634191.912:4607): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2582.984188] audit: type=1326 audit(1703634191.924:4608): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2582.993250] FAT-fs (loop5): Directory bread(block 6) failed [ 2583.016291] audit: type=1326 audit(1703634191.930:4609): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2583.025240] audit: type=1326 audit(1703634191.930:4610): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2583.028476] audit: type=1326 audit(1703634191.930:4611): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2583.046892] FAT-fs (loop1): Directory bread(block 6) failed [ 2583.048717] audit: type=1326 audit(1703634191.930:4612): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2583.055505] audit: type=1326 audit(1703634191.930:4613): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=30877 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2583.061363] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (64 blocks) [ 2583.073104] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.074796] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2583.076706] FAT-fs (loop1): Filesystem has been set read-only [ 2583.083764] FAT-fs (loop4): Directory bread(block 6) failed 23:43:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46b", 0x9, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2583.085184] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.090967] FAT-fs (loop4): Directory bread(block 6) failed 23:43:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:43:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1300, 0x0) [ 2583.229450] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (128 blocks) [ 2583.248778] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (128 blocks) [ 2583.251497] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2583.264459] EXT4-fs (loop0): get root inode failed [ 2583.265563] EXT4-fs (loop0): mount failed 23:43:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2583.296070] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (256 blocks) 23:43:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x361, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf0) [ 2583.320712] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (256 blocks) 23:43:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2583.345594] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.349496] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.353811] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.357363] FAT-fs (loop4): Directory bread(block 6) failed [ 2583.380527] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (376 blocks) [ 2583.398996] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (376 blocks) [ 2583.432204] FAT-fs (loop1): Directory bread(block 6) failed [ 2583.452793] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2583.454822] FAT-fs (loop1): Filesystem has been set read-only [ 2583.471827] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2583.789030] FAULT_INJECTION: forcing a failure. [ 2583.789030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2583.793023] CPU: 1 PID: 30905 Comm: syz-executor.6 Not tainted 5.10.205 #1 [ 2583.794411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2583.796092] Call Trace: [ 2583.796629] dump_stack+0x107/0x167 [ 2583.797407] should_fail.cold+0x5/0xa [ 2583.798185] __alloc_pages_nodemask+0x182/0x600 [ 2583.799136] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2583.800338] ? unlock_page_memcg+0x96/0x170 [ 2583.801230] alloc_pages_current+0x187/0x280 [ 2583.802110] ? lock_page_memcg+0xcd/0x270 [ 2583.802951] __get_free_pages+0xc/0xa0 [ 2583.803731] __tlb_remove_page_size+0x257/0x420 [ 2583.804666] unmap_page_range+0x1186/0x1fe0 [ 2583.805579] ? vm_normal_page+0x2e0/0x2e0 [ 2583.806415] ? lock_downgrade+0x6d0/0x6d0 [ 2583.807261] ? uprobe_munmap+0x1c/0x560 [ 2583.808061] unmap_single_vma+0x198/0x300 [ 2583.808922] unmap_vmas+0x16d/0x300 [ 2583.809668] ? zap_vma_ptes+0x100/0x100 [ 2583.810478] exit_mmap+0x27f/0x4f0 [ 2583.811192] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 2583.812265] mmput+0xca/0x340 [ 2583.812893] do_exit+0xa96/0x2600 [ 2583.813601] ? find_held_lock+0x2c/0x110 [ 2583.814412] ? mm_update_next_owner+0x7d0/0x7d0 [ 2583.815345] ? get_signal+0x37e/0x22e0 [ 2583.816132] ? lock_downgrade+0x6d0/0x6d0 [ 2583.816968] ? do_raw_spin_lock+0x121/0x260 [ 2583.817857] ? rwlock_bug.part.0+0x90/0x90 [ 2583.818710] do_group_exit+0x125/0x310 [ 2583.819502] get_signal+0x4bc/0x22e0 [ 2583.820255] ? l2cap_sock_connect+0x403/0x8c0 [ 2583.821174] ? __local_bh_enable_ip+0x9d/0x100 [ 2583.822084] ? l2cap_sock_connect+0x436/0x8c0 [ 2583.822986] arch_do_signal_or_restart+0x2b7/0x1990 [ 2583.823984] ? selinux_socket_connect+0x6d/0x90 [ 2583.824918] ? task_work_add+0x98/0x190 [ 2583.825745] ? restore_sigcontext+0x630/0x630 [ 2583.826645] ? __sys_connect+0x10a/0x1a0 [ 2583.827461] ? __sys_connect_file+0x1a0/0x1a0 [ 2583.828362] ? rcu_read_lock_any_held+0x75/0xa0 [ 2583.829326] ? vfs_write+0x354/0xa70 [ 2583.830075] ? fput_many+0x2f/0x1a0 [ 2583.830819] ? ksys_write+0x1a9/0x260 [ 2583.831595] exit_to_user_mode_prepare+0x10f/0x190 [ 2583.832599] syscall_exit_to_user_mode+0x38/0x1e0 [ 2583.833582] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2583.834631] RIP: 0033:0x7fd65359ab19 [ 2583.835377] Code: Unable to access opcode bytes at RIP 0x7fd65359aaef. [ 2583.836689] RSP: 002b:00007fd650aef188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 2583.838227] RAX: fffffffffffffffc RBX: 00007fd6536ae020 RCX: 00007fd65359ab19 [ 2583.839670] RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000007 [ 2583.841107] RBP: 00007fd650aef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.842543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2583.843974] R13: 00007ffeb3e39bcf R14: 00007fd650aef300 R15: 0000000000022000 23:43:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:43:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x500) 23:43:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1800, 0x0) 23:43:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x4}, 0xe) 23:43:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:25 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:43:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf79c, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2596.682092] kauditd_printk_skb: 11 callbacks suppressed [ 2596.682111] audit: type=1326 audit(1703634205.622:4625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2596.695576] audit: type=1326 audit(1703634205.635:4626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2596.712508] audit: type=1326 audit(1703634205.649:4627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2596.720270] FAT-fs (loop5): Directory bread(block 6) failed [ 2596.721869] FAT-fs (loop4): Directory bread(block 6) failed 23:43:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46b", 0x9, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2596.730214] audit: type=1326 audit(1703634205.650:4628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2596.738492] audit: type=1326 audit(1703634205.650:4629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2596.749960] FAT-fs (loop4): Directory bread(block 6) failed [ 2596.751376] FAT-fs (loop4): Directory bread(block 6) failed [ 2596.753113] FAT-fs (loop4): Directory bread(block 6) failed [ 2596.762350] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2596.764693] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2596.768094] EXT4-fs (loop0): get root inode failed [ 2596.769162] EXT4-fs (loop0): mount failed [ 2596.788858] FAT-fs (loop1): Directory bread(block 6) failed [ 2596.803196] audit: type=1326 audit(1703634205.650:4630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2596.812046] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2596.814055] FAT-fs (loop1): Filesystem has been set read-only 23:43:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2596.837300] audit: type=1326 audit(1703634205.658:4631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2596.855845] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) 23:43:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2596.890115] audit: type=1326 audit(1703634205.658:4632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:43:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf000, 0x0) [ 2596.936290] audit: type=1326 audit(1703634205.658:4633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2596.966602] audit: type=1326 audit(1703634205.659:4634): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31043 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:43:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x600) [ 2596.991835] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2597.001870] EXT4-fs (loop0): get root inode failed [ 2597.002992] EXT4-fs (loop0): mount failed 23:43:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7a0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2597.032916] FAT-fs (loop4): Directory bread(block 6) failed [ 2597.069380] FAT-fs (loop4): Directory bread(block 6) failed [ 2597.072125] FAT-fs (loop4): Directory bread(block 6) failed [ 2597.083040] FAT-fs (loop4): Directory bread(block 6) failed [ 2597.087501] FAT-fs (loop1): Directory bread(block 6) failed [ 2597.094922] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2597.097265] FAT-fs (loop1): Filesystem has been set read-only [ 2597.104266] FAT-fs (loop5): Directory bread(block 6) failed [ 2597.195402] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2597.242217] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) 23:43:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x506, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x2000000e) 23:43:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x80000, 0x0) 23:43:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xc00) 23:43:41 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2612.534020] FAT-fs (loop4): Directory bread(block 6) failed 23:43:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x2, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:43:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7a4, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:43:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2612.546886] FAT-fs (loop4): Directory bread(block 6) failed [ 2612.551355] FAT-fs (loop4): Directory bread(block 6) failed [ 2612.555617] FAT-fs (loop4): Directory bread(block 6) failed [ 2612.559119] FAT-fs (loop5): Directory bread(block 6) failed [ 2612.591914] kauditd_printk_skb: 10 callbacks suppressed [ 2612.591931] audit: type=1326 audit(1703634221.531:4645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2612.597101] FAT-fs (loop1): Directory bread(block 6) failed [ 2612.604359] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2612.606509] FAT-fs (loop1): Filesystem has been set read-only [ 2612.607988] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2612.609988] audit: type=1326 audit(1703634221.531:4646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2612.629541] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2612.637088] EXT4-fs (loop0): get root inode failed [ 2612.638409] EXT4-fs (loop0): mount failed [ 2612.640866] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2612.648356] audit: type=1326 audit(1703634221.549:4647): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:43:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe0000, 0x0) [ 2612.698918] audit: type=1326 audit(1703634221.549:4648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:43:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7a8, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2612.734237] audit: type=1326 audit(1703634221.562:4649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:43:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1200) 23:43:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x50b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2612.775644] audit: type=1326 audit(1703634221.562:4650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:43:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2612.822284] audit: type=1326 audit(1703634221.598:4651): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2612.826997] audit: type=1326 audit(1703634221.611:4652): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2612.833354] audit: type=1326 audit(1703634221.611:4653): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2612.837987] audit: type=1326 audit(1703634221.627:4654): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31204 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2612.870631] FAT-fs (loop5): Directory bread(block 6) failed [ 2612.872657] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2612.967337] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2613.017251] FAT-fs (loop1): Directory bread(block 6) failed [ 2613.056389] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2613.071186] EXT4-fs (loop0): get root inode failed [ 2613.072389] EXT4-fs (loop0): mount failed 23:43:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:43:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x50c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/exe\x00', 0x0, 0x20) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000c00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRESHEX, @ANYRESDEC=r3]) r4 = getpid() mount$bind(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000280)='./file1\x00', &(0x7f0000000300), 0x100020, 0x0) process_vm_readv(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340), 0x612000, 0x0) sendmsg(r6, &(0x7f0000000bc0)={&(0x7f00000003c0)=@generic={0x3, "b49ea4680572531c6493f20ebbd04761bc2455f9b8e9f5a559a140abf3d76dfbb3bbf930ad80be0cb93dcf17f20881e6a865cc30a40c82c548fc41f9046fddaab01728899354bc73ac5c9fcc4ab45c99de6e86b7fc94ef03b324646e84deadfe7001e1957bdc1a1a2b88cf8d1aa32d1ded78763d05c42d268575e09ed1f4"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="295e44e4e0b4973cfc91ddc2f215bc824dcb758ef71b88e95eacdb509ef770cf5a8d96129f304817a1570eab6f3b470c8f016391a266cf1908b82e8964d6df1da69ce903cd78f87cffd8594e4fd51e97b45c7ab3b6aa16d1517a3011e71983f3ddcaddad37d06ff9184b21514602094ecc2aff0ad2e1537b89f26a8b3c555363b3d712546f3c38458512e55106bd567eab727205b869f88d49dde83259328d23cf3775db18c890ef2c5dfbc2ec0e974aa453dd78b55402166e54d7e1fcc64c5b87c721c9fc63700d9ca61642dd6fcb501fb1b3d78e1316f2e99dc921", 0xdc}, {&(0x7f0000000540)="7dd2723b7815e81bc83d7f3dfd0af10b46cac97705a1ab7db5f428ec48df3218397800408419afcc555bb69ad3f2ce43e1aac2ad01a588ddc60cdf5898c36074e763a31322ba1c2ba0c9d730cfbac4c0ae07a47f6b076f5a3ee6f348d4961b6ced902f7977fb162e76033f84490139269d0699af77eb5f2d8e4c0a3edc1d1ba2084dab846ce9c0d192f755444f66c810139ca33163f542ff7c80e64f5d3c56131d60487e5e5c08565d87daa6ced9fec21c85fac0fbb73b6f5db759fcf0ad9e7cd6ce3957a84377f894108c8ac31880c06d03745592b4951ac292125945dc5a0f2a6cc2e77219424f5c1ee088727dadab", 0xf0}, {&(0x7f0000000640)="0c5deec987548be785dcf77c14f3559205d03c220525aebae52ade8f10ea35bc67e1d2b629c6bb14ec39b1c5eb3cf34a8783bfdf7b95a8fcaad3f044fe49de848206cc16f1c65aca93448309f7cd75ff7e20ae0127a910c03cf27732e72be4f89316d5de809a25a8852e3fbba6552ae4be99968f3ee8588a2065c20e92aaf2545c9ffd70f7cd47", 0x87}], 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x4d0}, 0x4000014) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pidfd_open(0x0, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:43:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x9, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:43:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf0ffff, 0x0) 23:43:55 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:43:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7ac, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:43:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1800) [ 2627.029519] EXT4-fs (loop0): unsupported descriptor size 0 [ 2627.038253] kauditd_printk_skb: 11 callbacks suppressed [ 2627.038272] audit: type=1326 audit(1703634235.978:4666): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2627.066195] audit: type=1326 audit(1703634235.994:4667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2627.073301] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.088319] audit: type=1326 audit(1703634236.001:4668): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2627.104459] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.105878] FAT-fs (loop5): Directory bread(block 6) failed [ 2627.113270] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.114781] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2627.121412] FAT-fs (loop1): Directory bread(block 6) failed [ 2627.127804] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.145522] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2627.147594] FAT-fs (loop1): Filesystem has been set read-only [ 2627.175056] audit: type=1326 audit(1703634236.016:4669): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2627.201139] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) 23:43:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x50d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:43:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:43:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1000000, 0x0) [ 2627.284717] audit: type=1326 audit(1703634236.028:4670): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2627.308561] audit: type=1326 audit(1703634236.064:4671): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2627.313161] audit: type=1326 audit(1703634236.070:4672): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2627.319738] audit: type=1326 audit(1703634236.089:4673): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2627.339282] audit: type=1326 audit(1703634236.089:4674): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2627.340703] FAT-fs (loop5): Directory bread(block 6) failed [ 2627.349118] audit: type=1326 audit(1703634236.090:4675): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31357 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:43:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1930) 23:43:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7b0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:43:56 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2627.425961] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.436986] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2627.438005] EXT4-fs (loop0): unsupported descriptor size 0 [ 2627.441267] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.444937] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.449047] FAT-fs (loop4): Directory bread(block 6) failed 23:43:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2627.474104] FAT-fs (loop1): Directory bread(block 6) failed [ 2627.499976] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2627.501950] FAT-fs (loop1): Filesystem has been set read-only 23:43:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:43:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x2000000, 0x0) 23:43:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7b4, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2627.567002] EXT4-fs (loop0): unsupported descriptor size 0 [ 2627.598041] FAT-fs (loop5): Directory bread(block 6) failed [ 2627.598398] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.605206] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.607083] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.612133] FAT-fs (loop4): Directory bread(block 6) failed [ 2627.677289] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2627.711506] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) 23:44:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:44:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x605, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000880100000018000200", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x34000, 0x10) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x400000, 0x142) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:44:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:44:09 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:44:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf7b8, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:44:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x3019) 23:44:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x3000000, 0x0) [ 2640.771723] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2640.783715] EXT4-fs (loop0): unsupported descriptor size 0 [ 2640.785773] kauditd_printk_skb: 30 callbacks suppressed [ 2640.785785] audit: type=1326 audit(1703634249.725:4706): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2640.791975] audit: type=1326 audit(1703634249.725:4707): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2640.802470] FAT-fs (loop1): Directory bread(block 6) failed [ 2640.805964] audit: type=1326 audit(1703634249.726:4708): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2640.814844] FAT-fs (loop5): Directory bread(block 6) failed [ 2640.815359] audit: type=1326 audit(1703634249.732:4709): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2640.823547] audit: type=1326 audit(1703634249.735:4710): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2640.830336] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2640.831500] FAT-fs (loop1): Filesystem has been set read-only [ 2640.833453] audit: type=1326 audit(1703634249.737:4711): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2640.837495] FAT-fs (loop4): Directory bread(block 6) failed [ 2640.843728] audit: type=1326 audit(1703634249.738:4712): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:44:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x3f00) [ 2640.851519] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (382 blocks) [ 2640.853010] audit: type=1326 audit(1703634249.741:4713): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2640.860205] FAT-fs (loop4): Directory bread(block 6) failed [ 2640.861528] FAT-fs (loop4): Directory bread(block 6) failed [ 2640.881109] FAT-fs (loop4): Directory bread(block 6) failed [ 2640.910364] audit: type=1326 audit(1703634249.741:4714): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:44:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2640.931309] audit: type=1326 audit(1703634249.742:4715): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31636 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:44:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:44:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x681, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x4000000, 0x0) 23:44:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf000) [ 2641.027823] EXT4-fs (loop0): unsupported descriptor size 0 [ 2641.046040] FAT-fs (loop5): Directory bread(block 6) failed 23:44:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100002, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2641.130436] FAT-fs (loop5): Directory bread(block 6) failed [ 2641.135047] FAT-fs (loop1): Directory bread(block 6) failed [ 2641.139868] FAT-fs (loop4): Directory bread(block 6) failed [ 2641.140945] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2641.143034] FAT-fs (loop1): Filesystem has been set read-only [ 2641.147261] FAT-fs (loop4): Directory bread(block 6) failed [ 2641.149410] FAT-fs (loop4): Directory bread(block 6) failed [ 2641.153558] FAT-fs (loop4): Directory bread(block 6) failed [ 2641.163841] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2641.169935] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2641.182973] EXT4-fs (loop2): mount failed [ 2641.222430] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2641.227622] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2641.233521] EXT4-fs (loop2): mount failed 23:44:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:44:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x5000000, 0x0) 23:44:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x80000) 23:44:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100003, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:44:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x2}, 0xe) 23:44:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:44:26 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2657.106028] EXT4-fs (loop0): unsupported descriptor size 0 [ 2657.123081] kauditd_printk_skb: 10 callbacks suppressed [ 2657.123093] audit: type=1326 audit(1703634266.063:4726): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2657.127434] audit: type=1326 audit(1703634266.063:4727): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2657.130170] audit: type=1326 audit(1703634266.067:4728): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2657.139033] audit: type=1326 audit(1703634266.067:4729): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2657.145283] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.149927] audit: type=1326 audit(1703634266.071:4730): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2657.158132] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.158906] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.160166] FAT-fs (loop1): Directory bread(block 6) failed [ 2657.160426] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.161830] FAT-fs (loop5): Directory bread(block 6) failed [ 2657.174289] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2657.176305] FAT-fs (loop1): Filesystem has been set read-only 23:44:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x6000000, 0x0) 23:44:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2657.204621] audit: type=1326 audit(1703634266.079:4731): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2657.221769] EXT4-fs (loop0): unsupported descriptor size 0 [ 2657.237569] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:44:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2657.247983] audit: type=1326 audit(1703634266.082:4732): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2657.251021] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2657.260792] EXT4-fs (loop2): mount failed 23:44:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf0ffff) [ 2657.283956] audit: type=1326 audit(1703634266.090:4733): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2657.284388] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.293553] audit: type=1326 audit(1703634266.139:4734): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2657.296296] audit: type=1326 audit(1703634266.139:4735): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=31800 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2657.315928] EXT4-fs (loop0): unsupported descriptor size 0 [ 2657.324495] FAT-fs (loop4): Directory bread(block 6) failed 23:44:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2657.330136] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.340970] FAT-fs (loop4): Directory bread(block 6) failed 23:44:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1000000) 23:44:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2657.386312] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2657.387825] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2657.390369] EXT4-fs (loop2): mount failed 23:44:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x7000000, 0x0) [ 2657.444022] FAT-fs (loop5): Directory bread(block 6) failed 23:44:26 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:44:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100004, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2657.495284] EXT4-fs (loop0): unsupported descriptor size 0 23:44:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) 23:44:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf000000, 0x0) [ 2657.634495] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2657.637378] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.654995] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2657.661336] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.670742] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.686701] EXT4-fs (loop2): mount failed [ 2657.689209] FAT-fs (loop4): Directory bread(block 6) failed [ 2657.779558] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2657.800590] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2657.824018] EXT4-fs (loop2): mount failed 23:44:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4}, 0xe) 23:44:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa01, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x2000000) 23:44:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f610601004000", 0x20, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x13000000, 0x0) 23:44:39 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:44:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100005, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:44:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00ebf58905d31c16fb0a74422b178629a5482a7f47afdb4e75dba6d87028040eb37b6e7c23280fe9055c9f548a383aa0d1079a0e6bb59e9953a7d310f03f5760b74273482e1dd4d5a3da393111501a9ddb73a9393dda4f8ae748b2a9e0358ed3981e1257ffb41b584942cea5663561901f0f2cb49d5e50562556299ae19963736c27ac27013279e41db2705f1f44d20bdd6e0dab0c8ad60e3f8cdf5b093f466691c3af848b340d157d"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x6d1c, &(0x7f0000000300)={0x0, 0xdba7, 0x8, 0x3, 0x344}, &(0x7f0000004000/0x2000)=nil, &(0x7f0000004000/0x2000)=nil, &(0x7f0000000040), &(0x7f00000000c0)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000006c0)=@IORING_OP_SENDMSG={0x9, 0x5, 0x0, r0, 0x0, &(0x7f0000000680)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x0, 0x2, {0xa, 0x4e21, 0x3, @ipv4={'\x00', '\xff\xff', @remote}, 0x1ff}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000500)="48b581177a423051340a9b11ead2ac5626b853eb842290cfabedd1a2880784facf4280fc809651087ad416d35833020ecd3c07a35c111460183b742c4875192ef4f23211fc8137e9a6a13eebb778e0e9024df617cb43d8734f8245163856424e860f9cc04fdf163fbdbc", 0x6a}, {&(0x7f0000000580)="22b533efd1f1c004f2bf70c9ffcc4bcf7393756ede8a93696e282ca7656b062d7b2462a9a1ac11cdebd3f65eccca32d98df9c9387d5f0b8566bf1b5e3005744d49f75be7830faa6f82352d880fb8a3e013a2ed49bd639ee4dd39dac73fd067bafe7e9befc3ffde576566078ab8e513b973c140e832c6ea37447101e70f6ad3336dcacd4abc0006a350ce95067bd20ade2dfa1f35b7ddbf4ca211d529425b124f85cfb762492c13c7ad69421826e8c6740596c47e90c32adf0ab32bbba076d676a41d80044484ac1406bff751a4545d83348178e9731478cc601fc8db87b89854575e1f8b9346bd49372108f040b0a9a0", 0xf0}], 0x2, &(0x7f0000001080)=[{0x1010, 0x10b, 0x5, "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"}, {0x1010, 0x116, 0xffff, "0a7125485ec359e087a2c67194069b6cadd9844e21f6a61d968184a9a9b958596fbacdf79f5a1467b2d46cbacd0d4bb167e56d2be07ae2bbfa5738437ab7538c382aa1a35e54dccb7eb1877215ecb1106873060ac8b6043adb1e406218df57a1825f8b8ccb177488c70c1de0a0a14c3afa485b0360d10bb194b2e6bb4eb1e30a55ec49cc976a5883d1582201a2f4536508eaad298a97d18f83720c86b2ea49122a5c3efc6375b8da21aa0f457305751d30a7da39edb0954e31481d675c1741e65776548925e1602d5fcb9460c7d3f2abad26fa13b148385613d321911a40d94b3da30ad740097c46ab242c789e1d20ab0eb9c9b82cba52589638e01db0314aff903da3cf94cd49e3742b49c4ab4a765387167a6935d471030fb8e4f36ee060fe70fd8ca434829d17ebf6e026f8340c5c8271022414bc2aff7dcf4b4b0e5102ae235d8b070fced3e7973a7741d95905fd00a70f01e5a2de7ef50c82872b09f7ae78d1369f10ee3c6284f759caf37a09bb8be303daf3f617f12f5b42caf86dd97552ef436ee6b5555baf870efddabb909025e0d357c7304decb8b2591facf589178e772ccfb31a1191943c2df22720db3a931acc4651611c81aab180cdad439a11e59aee0227803c51640169e5ec2ad2e8cab604d8d418c4624081ff5f3fcbf207ea4f23f663ae4a4cecf88949de4970e37177f67a66ab00dfddcddec78928d83b46225cb916452d52ba8fa8bbb5906b26da8e6794938160c88ff57227df9f79ffd83467a76ef39a6ba321a72a068f879a24250c7aa8e41959d5e87a46c3419fa691bcd9e4bdc7a931e4f313a4f81bab9b6ee8eef9cdb346733fd2cd17e568300f6e25ef6dc53f836620bc7e178ec676a587fd1f5795b70bd3e308a102844cd3797658daa335085dc9c59c1510d7431e415ac01a24e8c87050b2e8ca89b52d48c8bbc78332aba3fccc9e3f256f0b5d05f18a9482f585b854ecb0d59f46d27fc25e9a1fa7985ec5eae48ec791206ff97d945a419e4ed43332d0044abcb796cf3527d414839c422c9b95bb6383a1539230fbf29879ae8e343ecdbff87e3c34275c9b3fb0735af01f862289ec1251cdfe4609e2215b496aab935e9ad8f705d2f777c29d2f188c75f3aec094245539fad24b2726d34818f0a64aad3fc4b3c26bdfdac53e2efc4c83252bc57e02611964e3ecad5f5a74059f101f3f6ac411c4d6431b3cd911b883c71697bb9e889779625cbcb725e88e25423642921e04afecf7efc4e6a314a153da32cef7c9c42f993791a856ea787def5f5f07db9811e72461d9f2429ee6c82af2bcb0088b292aa4e3ba2b496fcac869d58a22f2d920c75178020c7ec2c13393e3c11ad9e4099f92c0db3a4e419efa9a8e75b71940d192898e486fd0849eaf85042a8ee2581348977326605b07a86b4acc9018534815822f97ddaabf721e672cc89fc6d209edeba65c0f62efb50cf6c4bc0ca130d30ababf9567102ca4d12483caa7fcf75f03bde430a4df4179a107eca53956ee4193839505edd936774ac9abc73af337a5c80e910cdbc24c3c35a963f8840509925cc9ea423c1e33d0bc148a4acd63d9cf1280c754416af6ca41a54b0428df27b011af7619db5c95ec8d90fd18dca2e6b4c52fb57c7f8ae90baf8e4938f48ca4df430af2dbd6373912c35d3bb60891ebceacb6e0400d75602b8de095de392ff0da58410f0d13c9996e5e388da858f042ae57375617efa7947be118c94bee94fee2850c23de9454b1a71c412fa3ec3e7db556e16acdad8aca919fc2984e757a40cb239dfdc5bcee1b228bda17eec85cb7926e848d8d9dce3553f513ede51d8b76a7a833bd251f6efc0f5ca5548aa6f12ff8652a29b912fc6b6d4220f9b6fc7801411cbb53b465ccb455fc3d491840cf1152c435d72836e8cbcef0f857e00508b32f230443b9687702fcaf8f99837ea68ef5a4ae96e9884601542c067e36de2bfdb1c71752becb030725e2ce1b3fb2e8734b064baa486402826834a681a46389e2ab68889a955644c91708fb126e64b90aa6405c6ed6c784969487c9fd4cd648fbb0df708c235c494f72e310a8ac76f4ce7871d2a36cc9cbef82fd837ac4ebeb0e475d442e45dcd64aa91c35f3fc1ae55ec2111f44b587ea3e2a240ca08faac7d78f9d7a4344bfef28b059cab554fe7d056af5c880b8f0055de6ebf4afa110bb35d75abffd909a1b90f68788f6aefff77080473bf4995f6db09a09f733ca42c031008aefb97228e381091dc7242344dfd0148ab32e7a14c0d35cc1470ad931931727d4f4ccb4d2f55bea361dc1f6a6d811a01bc961531b572c0ff3744ba624ae7998b06443fef9b5ead279afd02532d58b006fab47f69d0d7da92cce735596a12a07cf9c5197229a7acc32e06dbb989a2faab9f9947658a380fec16cf496736d4b67702b9fabf5fa5553a81213caafb0180e30a6c5cd8e531390182f14d08b9da5e028e8eb7ec85fb77c12fa9c5767d1a0d47712c0add0c5e1fa37656ee788bec5a1cd04fa1becc0fd028860c2a820959684457dbb50ba201ab590efa9ee84ef585eab05d594818974bc1e799d089153698d0eb0d7ec382f96720f51d4e543fedaf68d6b1a88ed1115ccdb399a2008bf7687e1f4bc66fcf27520ccb515999d85aaf4b28778eb6930e35f37d935d336e82686ab62826a83084950fe2302df821d7fbad3d9ee80c1186689b547fef29753a6dfc3da1e56fb64222cf27266cd9d3417a8bbc25fadc3526379e776e6b325a8f3ef3da6c48780ee696ac589c073c34bca53affcb2fced5b9f308d5aef723c0263f016061427f1f64f81592748f2f6ac62df26826591d19679f55e346ec7b8ffe8ac2cd33150814ac7ec22939f00e0497c085c11a717f299ddeaf64ad4d2a0936406fe3cdac2a0835584cb85ad99f01c4576f4d2a118990993fec5399b1fe35267ca304e719f60700b7140993e88f4a09bc6d13df6b3c283d8b3a7024deecaa1c1ec16d220a1732c3b39d87cc844e7e04f130224387c5525a3cfeb81091417a3f09fbc333f69f0c716ce54e77b468e6cbf8145a8f31c8514fed0d9f4d202d6f39ec7f6c7724eee71b37081e91140b2c85331ce7c4c463a7c6e3ff41795aaac6e49a15cea3d746d97af24c0f15018473dcfc8e3095b977cdbd89f888680664bd5ebe51d114fce541a6a92a4d9011321b69b135559050edcdcc9c830294c7ac881add18a6d79039e4e3fa6c4d1890468e207b8487d6a53eafb17f9cc8f4f379a10f43602f187ffbb73979f56eae0483fecfbd4319de7d0bcf5d6fe96df505c49082a751cbaa02f6bad9aab2dda0927bd883390b31ccd39fe18ec1e6cddf0a55a947412d992ebc779a47d101916e9d6ac90438ef011ed0d62712ec49a9b24e9da7e649490bd75f39d70db34be946f8e0370019ba592c7c1f264833548f1f00d9af7f9ce321c942c4b1c860d22aed91501b1e92b3210506060033d8ea91c091a00285035268ae34939af9d3af509b032305662fb29d5d6a6a450f6e7fef6c486006ec37a2b6574de9fc52cd6c28b660383cb90bebf0c9111e6bba320daa3cb9866c8955fee73b00073ff08bc3a96f6eaafdf296994ea1b3c5501c8261caa85aead5cd1445f0c04eb415466dc838c0313826463a433b5ee755b5aa425f9455c1d4ba3dd11db46c5d9c70b763025ded14609abe850f8824b71c6e5a3f8df9ca1c227a6355f63e46c4f84c5040fb10bddd1eed79cd12481aade60578f745aeee88a6a119642cbcbd38d90b7f6fa4a4734150520f4596731d50ffc306ea16d5ab352e06b3a31ea16312832fed6c4ce867ae4ad35becb0c28d057af23cf2e106f9ca4b7c29dfffd53b2c48c9b3d160b7161f1fb4f3c525a5f06386fdd7f88bbfe1ec8d520f51f2e693ec76dbb1f4acf793d53f2c0ef08221f82f9f39e9606cb948e3cf622928686315a80829a2b2409ece47e61baf964dc3bbaea7ce23ffdd3cf41a258f8818554d15e88d3042689186cc2ccec7c24b54ebaa481c61af3ef6303f34ee96d4a80b58283428fc5ed48fffb587ed3e6b7326be155a2b590d4a75a715999c8b67c72be7285e9c0058b67ca69a009a52e5e7ddcce37574b9bbfd09f004278e1e30d9ec2ab816551f8f6e55e3a36287665e6c7e0b39b908267b58cd99aa47e1e2f951113076141bc97dc9c7b768270db14fbed4eb8502f401f1c42a2be2bd5782148975ef8f049fc2d33e944fa464935fb518e10ea601435bb60d8b12f5b3b6f60e4cc0fcf52a4a94a113d1c2b8d2138d7bc9ab1f62b312cf1f0673cbf87d74aec8f2124b74bcd157aacb8b4a5aa8feedf4dc597d791bb84c028d4411207e5a7b1ef1feebf84f49a191c3406840272f9bbf4ab5b2a7703d9caec2480ddf3c33baff6501bc2994347f2f1b57ac906761a792c0a8c47936afe32e6c8eccb93bf466946a5a61be1c8a2be4c0e3e515b0979f11f115dd9aedaeb892ca81250184e667773bd8ae1b979abb177425da214c5dd45874053b021dcc0f51ef02bbb5781cc5477c20ea68c629cf998db6babe0ad2906808e935f7927265f8fbb381d39a91610735fd2ba07d4f5452ece4e7f901aac15f36c1809d651a18ba18dd72d84b05acb3e1c59e378f1cc2bb5aa1fe645605b64b94bfee5de4ed418eb7e98d07d6e8c7309a7b1e21e5d2f02b5bfedb6a3340c09b89c4af40ffbf1e5a8bc28504a61528bdf4b18499b1e57c1d63346a2040334e3034a7ef5f8f4d119a2d833244cd892eeda221599f1e4bef814bb9ebd30e6842ab7196f9dbb8ce2def8bc490806fd99adffb33be7c716042957efb5d149f57a3fcd22e061065eaae2bb20dd80f4b401fb7774e2bb6282df11124514d51d04ca8a2cc1772f627f939ea1db4650f1fd3327c63cc3d7f3b0a2ae3e1deb84392b688386e2a3634942f370a0f24cc544a864a6793e001848392db2c65a25d926ded8758e502d0a12526fb415cdcf91f771fdb9b4b518996e28499870ffc80d56fb1641931ecff574fb5882b88f44c4656390f175cd5360279ae5b0b467f51a4159828861575f01125f7c4c45577e188c1c5654a017943a3e0b2825ceedb66f997f5da319ef36795ed1dab7998863a1dd736319b01319d199a23ee257be03c04685af4f898b1940ca1ed6af5f507a25947bd2134cdcd1bb6ad1068e96ac61f398f4dde672978acda24bd62dfe9802bdb6f1a76a5fbce16555a178c716c2a5e0f2ed6ff5a7d29e5abe3b4ccb369322089858b3c0db48831173aa7285541ba44dc70b765f3252835742f1e288762be87f437f95ae282dfe852ceb00407ede43a8cebe9a83b7d618aff333c35a5ad8ab3d278c554b321931e783bd04e7f7736fe357d5b784f9076639762f1e68889cbb1f8f224f8d03a1c55c5810f4f05d243a25718e6a1180092ccc874dfa756cec842ec4586af5e7331267d608a4aa1b94d70e33383149c1b9206b8ce096c9b2a51b3b20f44b9bc073d3ae6a2afd9061b96fa90239d81c65aff8f71f6eba2a61ef8f812ed3f8b8f63b6e389dfa208b6e4d071e59a1848baf97d1e0b65cb7af4bbffdac55ea80bc328be026ecf90dad61453a06c0ead4abb4deb2da5927bb1a9f4ae7f2b885dc4a18bc6c903e7d346186d45053ee1c836bda4be53f9e55886b419d24aa4a60b876136d3a4b6d471b3a772cfc3275bebf63d0098e05e3d7cdbc605c5e375dcfb912f89a927a32d245d69f6fadc842f117820daa489467175ca6c23dc360e08afd7dc1bcdf5ae918dd5c857420f44bf7a5d66fa7050e9e4b8094e2"}, {0x18, 0xff, 0x3ff, "b400c1d091c6"}, {0xd0, 0x111, 0xf9, "ba78ea26cf8030f1e5ffd9528f94d57807c97bb371363635deba906847aac2acb61fa57dd40c932a4deab80f1f92051e6f91560ad0dab05b590f563c81971a4666e3ec65933ab0f625a244d110ebde81869d022e962bb28e99ac68043ef8c6b1a735c5e7187a230485becdaf4b7c980a12d8a30b2d7767d465d531fc36ae152c93b101f9e4cec030cf47ab065011a5e41e18a391bd9f27472a0d9e3bdd9643741ad37ae9b2231c281f1fb26fe4a65b9ee47e053c5124cdc561e596f4"}, {0xc8, 0x111, 0x200, "f3ca90bbbb3eda9cb0c2678a8a6b56ea2fd04414214ccca054886ef46474e0a5ce036e2c31f99f8bff732653b73e6859edba683014a9c90e5a9a7bcfed3862e8ff1278fdc1e2bf2eb42de8cd7da437b5ebed6612c9beb23e00a3859b429385c439807fedc0589eb30ada5acaef6377a4ab561684966d8d7b8a5c1684cf2944a6438d21be13893cc461fabbfb98cb6cfab7dec2b05df082a8342bb83d4f8b774e4f0d7f176e69f5571260a56ee95152406a35"}, {0x10, 0x10d, 0xa3}], 0x21e0}, 0x0, 0x10000000, 0x1, {0x0, r4}}, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2670.431908] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2670.433892] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2670.438981] EXT4-fs (loop2): mount failed [ 2670.449323] FAT-fs (loop4): Directory bread(block 6) failed [ 2670.453407] kauditd_printk_skb: 31 callbacks suppressed [ 2670.453424] audit: type=1326 audit(1703634279.393:4767): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2670.461287] audit: type=1326 audit(1703634279.400:4768): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2670.476921] audit: type=1326 audit(1703634279.400:4769): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2670.488382] FAT-fs (loop1): Directory bread(block 6) failed [ 2670.494070] FAT-fs (loop4): Directory bread(block 6) failed [ 2670.494374] FAT-fs (loop5): Directory bread(block 6) failed [ 2670.495191] FAT-fs (loop4): Directory bread(block 6) failed [ 2670.498820] FAT-fs (loop4): Directory bread(block 6) failed [ 2670.499854] audit: type=1326 audit(1703634279.406:4770): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2670.518103] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2670.527721] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2670.529999] FAT-fs (loop1): Filesystem has been set read-only 23:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x18000000, 0x0) [ 2670.543770] audit: type=1326 audit(1703634279.406:4771): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2670.546480] EXT4-fs (loop0): get root inode failed [ 2670.547869] EXT4-fs (loop0): mount failed [ 2670.553975] audit: type=1326 audit(1703634279.406:4772): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2670.558534] audit: type=1326 audit(1703634279.406:4773): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2670.560954] audit: type=1326 audit(1703634279.407:4774): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2670.564167] audit: type=1326 audit(1703634279.407:4775): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2670.566840] audit: type=1326 audit(1703634279.407:4776): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32088 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2670.574010] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2670.591240] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2670.596989] EXT4-fs (loop2): mount failed 23:44:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:44:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x4000000) [ 2670.676175] EXT4-fs (loop0): unsupported descriptor size 0 [ 2670.788206] FAT-fs (loop5): Directory bread(block 6) failed 23:44:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x5000000) 23:44:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe5ffffff, 0x0) 23:44:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100006, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:44:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2686.779653] kauditd_printk_skb: 10 callbacks suppressed [ 2686.779665] audit: type=1326 audit(1703634295.719:4787): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:44:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x300}, 0xe) 23:44:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb05, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:55 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:44:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000400)=""/222, 0xde}], 0x1, &(0x7f0000000940)=[{&(0x7f0000000300)=""/164, 0xa4}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/90, 0x5a}, {&(0x7f0000000500)=""/69, 0x45}, {&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000680)=""/234, 0xea}, {&(0x7f0000000780)=""/253, 0xfd}, {&(0x7f0000000880)=""/144, 0x90}], 0x8, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000140)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345}, 0x4) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) process_vm_readv(r1, &(0x7f0000000fc0)=[{&(0x7f00000009c0)=""/236, 0xec}, {&(0x7f0000000ac0)=""/94, 0x5e}, {&(0x7f0000000b40)=""/248, 0xf8}, {&(0x7f0000000c40)=""/135, 0x87}, {&(0x7f0000000d00)=""/98, 0x62}, {&(0x7f0000000d80)=""/159, 0x9f}, {&(0x7f0000000e40)=""/72, 0x48}, {&(0x7f0000000ec0)=""/222, 0xde}], 0x8, &(0x7f0000002600)=[{&(0x7f0000002080)=""/91, 0x5b}, {&(0x7f0000002100)=""/216, 0xd8}, {&(0x7f0000002200)=""/240, 0xf0}, {&(0x7f0000002300)=""/72, 0x48}, {&(0x7f0000002380)=""/161, 0xa1}, {&(0x7f0000002440)=""/168, 0xa8}, {&(0x7f0000002500)=""/252, 0xfc}, {&(0x7f00000000c0)=""/15, 0xf}], 0x8, 0x0) [ 2686.785781] audit: type=1326 audit(1703634295.725:4788): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2686.791077] audit: type=1326 audit(1703634295.729:4789): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2686.797798] audit: type=1326 audit(1703634295.730:4790): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2686.806952] audit: type=1326 audit(1703634295.730:4791): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2686.813098] audit: type=1326 audit(1703634295.730:4792): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2686.825893] EXT4-fs (loop0): unsupported descriptor size 0 [ 2686.827599] FAT-fs (loop5): Directory bread(block 6) failed [ 2686.831534] FAT-fs (loop4): Directory bread(block 6) failed [ 2686.838073] FAT-fs (loop1): Directory bread(block 6) failed [ 2686.841881] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2686.841947] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2686.845416] FAT-fs (loop1): Filesystem has been set read-only [ 2686.845434] FAT-fs (loop4): Directory bread(block 6) failed [ 2686.851735] audit: type=1326 audit(1703634295.735:4793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2686.854442] FAT-fs (loop4): Directory bread(block 6) failed [ 2686.859136] FAT-fs (loop4): Directory bread(block 6) failed [ 2686.863200] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2686.864967] audit: type=1326 audit(1703634295.735:4794): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2686.889069] audit: type=1326 audit(1703634295.735:4795): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2686.891016] EXT4-fs (loop2): mount failed 23:44:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2686.902983] audit: type=1326 audit(1703634295.736:4796): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32233 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:44:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x6000000) 23:44:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc05, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2686.985546] EXT4-fs (loop0): unsupported descriptor size 0 23:44:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf6ffffff, 0x0) [ 2687.043631] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2687.048726] FAT-fs (loop1): Directory bread(block 6) failed [ 2687.050230] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2687.056541] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2687.057613] FAT-fs (loop1): Filesystem has been set read-only 23:44:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f", 0x10, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2687.064225] EXT4-fs (loop2): mount failed [ 2687.073585] EXT4-fs (loop0): unsupported descriptor size 0 [ 2687.080799] FAT-fs (loop5): Directory bread(block 6) failed 23:44:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:44:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xc000000) [ 2687.125934] FAT-fs (loop4): Directory bread(block 6) failed [ 2687.127442] FAT-fs (loop4): Directory bread(block 6) failed [ 2687.128293] FAT-fs (loop4): Directory bread(block 6) failed [ 2687.129261] FAT-fs (loop4): Directory bread(block 6) failed 23:44:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:44:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100007, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2687.195568] FAT-fs (loop5): Directory bread(block 6) failed [ 2687.234502] FAT-fs (loop1): Directory bread(block 6) failed [ 2687.239232] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2687.240365] FAT-fs (loop1): Filesystem has been set read-only 23:45:09 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x2}, 0xe) 23:45:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f", 0x10, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:45:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100008, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:45:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xfffff000, 0x0) [ 2701.007545] kauditd_printk_skb: 9 callbacks suppressed [ 2701.007556] audit: type=1326 audit(1703634309.947:4806): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2701.013377] audit: type=1326 audit(1703634309.953:4807): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2701.017122] audit: type=1326 audit(1703634309.956:4808): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:45:09 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:45:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd02, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x12000000) [ 2701.022745] audit: type=1326 audit(1703634309.960:4809): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2701.032165] audit: type=1326 audit(1703634309.960:4810): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2701.037813] audit: type=1326 audit(1703634309.960:4811): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2701.042784] audit: type=1326 audit(1703634309.969:4812): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2701.045573] audit: type=1326 audit(1703634309.970:4813): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2701.051512] audit: type=1326 audit(1703634309.970:4814): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2701.054929] audit: type=1326 audit(1703634309.970:4815): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32402 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2701.065021] FAT-fs (loop1): Directory bread(block 6) failed [ 2701.067454] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2701.068714] FAT-fs (loop1): Filesystem has been set read-only [ 2701.071126] EXT4-fs (loop0): unsupported descriptor size 0 [ 2701.077902] FAT-fs (loop5): Directory bread(block 6) failed [ 2701.082363] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.089223] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.091085] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.099258] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.105727] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2701.109612] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2701.113228] EXT4-fs (loop2): mount failed 23:45:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd05, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f", 0x10, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x18000000) 23:45:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xffffffe5, 0x0) [ 2701.212161] FAT-fs (loop5): Directory bread(block 6) failed 23:45:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100009, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2701.276950] EXT4-fs (loop0): unsupported descriptor size 0 [ 2701.282821] FAT-fs (loop1): Directory bread(block 6) failed [ 2701.289378] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:45:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2701.290445] FAT-fs (loop1): Filesystem has been set read-only [ 2701.300317] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.302592] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.303360] FAT-fs (loop4): Directory bread(block 6) failed [ 2701.319990] FAT-fs (loop4): Directory bread(block 6) failed 23:45:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000a, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:45:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x19300000) 23:45:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45", 0x18, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x3}, 0xe) [ 2701.423976] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2701.433875] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2701.453528] EXT4-fs (loop0): unsupported descriptor size 0 [ 2701.454880] FAT-fs (loop1): Directory bread(block 6) failed [ 2701.458543] EXT4-fs (loop2): mount failed [ 2701.472597] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2701.474722] FAT-fs (loop1): Filesystem has been set read-only [ 2701.560207] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2701.568302] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2701.579436] EXT4-fs (loop2): mount failed 23:45:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:23 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:45:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x3f000000) 23:45:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45", 0x18, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000b, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:45:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xfffffff6, 0x0) 23:45:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x4}, 0xe) 23:45:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = dup(r0) openat(r5, &(0x7f00000000c0)='./file1\x00', 0x200, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2714.421204] kauditd_printk_skb: 9 callbacks suppressed [ 2714.421224] audit: type=1326 audit(1703634323.360:4825): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2714.425951] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2714.429280] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2714.433989] EXT4-fs (loop2): mount failed [ 2714.445109] audit: type=1326 audit(1703634323.380:4826): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2714.464407] EXT4-fs (loop0): unsupported descriptor size 0 [ 2714.469280] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.471554] FAT-fs (loop1): Directory bread(block 6) failed [ 2714.475325] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.476280] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.482884] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.487398] audit: type=1326 audit(1703634323.380:4827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2714.494401] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2714.496672] FAT-fs (loop1): Filesystem has been set read-only 23:45:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45", 0x18, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1000000000000, 0x0) [ 2714.541023] audit: type=1326 audit(1703634323.381:4828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2714.557595] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:45:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf6ffffff) [ 2714.585786] audit: type=1326 audit(1703634323.395:4829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:45:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xfffff000) [ 2714.611455] FAT-fs (loop4): Directory bread(block 6) failed 23:45:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2714.627286] audit: type=1326 audit(1703634323.395:4830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2714.635201] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.636312] FAT-fs (loop4): Directory bread(block 6) failed [ 2714.642008] FAT-fs (loop4): Directory bread(block 6) failed 23:45:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000c, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2714.666853] audit: type=1326 audit(1703634323.395:4831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2714.679735] audit: type=1326 audit(1703634323.395:4832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2714.682593] audit: type=1326 audit(1703634323.396:4833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2714.687138] FAT-fs (loop1): Directory bread(block 6) failed [ 2714.690206] audit: type=1326 audit(1703634323.396:4834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=32573 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2714.717920] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2714.721975] FAT-fs (loop1): Filesystem has been set read-only [ 2714.751451] EXT4-fs (loop0): unsupported descriptor size 0 [ 2719.877681] Bluetooth: hci7: command 0x0409 tx timeout [ 2721.925696] Bluetooth: hci7: command 0x041b tx timeout [ 2723.973664] Bluetooth: hci7: command 0x040f tx timeout [ 2724.452108] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2724.453963] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2724.456841] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2724.515713] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2724.517917] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2724.520398] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2726.022775] Bluetooth: hci7: command 0x0419 tx timeout 23:45:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000d, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:45:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x8000000000000, 0x0) 23:45:48 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r4, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:45:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xfffffff6) 23:45:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106", 0x1c, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2739.759344] kauditd_printk_skb: 35 callbacks suppressed [ 2739.759362] audit: type=1326 audit(1703634348.699:4870): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2739.765060] audit: type=1326 audit(1703634348.699:4871): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2739.781052] audit: type=1326 audit(1703634348.700:4872): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:45:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:48 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x2000000e) 23:45:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r2 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {0x0, r5}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f00000531c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f00000541c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f00000551c0)={0xfffffffffffff402, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r9}], 0x0, "2654ad91db223a"}) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r10, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r11, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2739.788112] audit: type=1326 audit(1703634348.708:4873): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2739.792757] FAT-fs (loop4): Directory bread(block 6) failed [ 2739.793186] audit: type=1326 audit(1703634348.708:4874): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2739.806031] audit: type=1326 audit(1703634348.709:4875): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2739.819323] FAT-fs (loop4): Directory bread(block 6) failed [ 2739.820655] FAT-fs (loop4): Directory bread(block 6) failed [ 2739.825025] EXT4-fs (loop0): unsupported descriptor size 0 [ 2739.834016] FAT-fs (loop1): Directory bread(block 6) failed [ 2739.851863] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2739.853903] FAT-fs (loop1): Filesystem has been set read-only [ 2739.863206] FAT-fs (loop4): Directory bread(block 6) failed [ 2739.878089] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2739.881982] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2739.886061] audit: type=1326 audit(1703634348.709:4876): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2739.893298] EXT4-fs (loop2): mount failed 23:45:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1201, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe000000000000, 0x0) [ 2739.965706] audit: type=1326 audit(1703634348.709:4877): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:45:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106", 0x1c, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:45:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1000000000000) [ 2740.008172] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2740.015836] audit: type=1326 audit(1703634348.714:4878): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2740.021888] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2740.032338] EXT4-fs (loop2): mount failed [ 2740.057157] audit: type=1326 audit(1703634348.714:4879): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33091 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:45:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000f, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:45:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1530, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:45:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(r0, &(0x7f00000002c0)='./file1\x00', 0x105542, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) lseek(0xffffffffffffffff, 0x8001, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2740.232474] FAT-fs (loop4): Directory bread(block 6) failed [ 2740.233985] FAT-fs (loop1): Directory bread(block 6) failed [ 2740.234252] EXT4-fs (loop0): unsupported descriptor size 0 [ 2740.240237] FAT-fs (loop4): Directory bread(block 6) failed [ 2740.241702] FAT-fs (loop4): Directory bread(block 6) failed [ 2740.246218] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2740.248199] FAT-fs (loop1): Filesystem has been set read-only [ 2740.267667] FAT-fs (loop4): Directory bread(block 6) failed [ 2740.300947] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:45:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106", 0x1c, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2740.312911] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2740.318838] EXT4-fs (loop2): mount failed [ 2740.379750] EXT4-fs (loop0): unsupported descriptor size 0 [ 2740.390796] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2740.401785] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2740.421945] EXT4-fs (loop2): mount failed [ 2742.341718] Bluetooth: hci7: command 0x0411 tx timeout 23:46:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x14d) mmap$IORING_OFF_CQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x4, 0x1010, r1, 0x8000000) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB]) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r7 = openat$cgroup_devices(r3, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0) dup3(r7, r5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file0\x00', 0x2001, 0x11) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:46:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00b1752f79a6c76d59fadfedbcc49d797689414838038bb497fbf468432b050000297c605f40b8e34a99738aa1422da70b441685dfa04efee8f74270c3876aa2da9a1114d8ee28fe9bdf864a6d1c243f4c743eb440ee2dde43c854f1ab87dd7f7c7e2c4833a71e6a51658e156674969b24aec3e929a378acd0a15d890ff69a8d6cb9fca42b7e9291179c353576ed4d9064918391a0ef2f716cb5bfb2b8bb7d21dab3fdf639a4f7d3554bf5df22de103d990c5d216b24"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:46:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x8000000000000) 23:46:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:46:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf0ffffffffffff, 0x0) 23:46:04 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:46:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:46:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100010, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2755.618577] kauditd_printk_skb: 11 callbacks suppressed [ 2755.618592] audit: type=1326 audit(1703634364.558:4891): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2755.621790] audit: type=1326 audit(1703634364.559:4892): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2755.625952] audit: type=1326 audit(1703634364.559:4893): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2755.636541] audit: type=1326 audit(1703634364.562:4894): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2755.645119] audit: type=1326 audit(1703634364.562:4895): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2755.654013] audit: type=1326 audit(1703634364.562:4896): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2755.659231] EXT4-fs (loop0): unsupported descriptor size 0 [ 2755.682869] FAT-fs (loop1): Directory bread(block 6) failed [ 2755.684325] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.696668] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2755.699003] FAT-fs (loop1): Filesystem has been set read-only [ 2755.703496] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.711268] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.718366] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2755.721380] audit: type=1326 audit(1703634364.573:4897): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:46:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2755.736753] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.748892] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2755.752963] EXT4-fs (loop2): mount failed [ 2755.784066] audit: type=1326 audit(1703634364.574:4898): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2755.794115] audit: type=1326 audit(1703634364.574:4899): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2755.805559] audit: type=1326 audit(1703634364.574:4900): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33269 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:46:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf0ffffffffffff) [ 2755.841464] EXT4-fs (loop0): unsupported descriptor size 0 23:46:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x100000000000000, 0x0) 23:46:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2755.896241] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.906311] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.907062] FAT-fs (loop4): Directory bread(block 6) failed [ 2755.908485] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2755.908667] FAT-fs (loop4): Directory bread(block 6) failed 23:46:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2755.939129] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2755.941570] EXT4-fs (loop2): mount failed 23:46:04 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:46:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x200000000000000, 0x0) [ 2755.966523] FAT-fs (loop1): Directory bread(block 6) failed [ 2755.984249] EXT4-fs (loop0): unsupported descriptor size 0 23:46:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100011, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2756.041593] FAT-fs (loop4): Directory bread(block 6) failed [ 2756.043231] FAT-fs (loop4): Directory bread(block 6) failed [ 2756.047897] FAT-fs (loop4): Directory bread(block 6) failed [ 2756.055904] FAT-fs (loop4): Directory bread(block 6) failed [ 2756.072423] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2756.093217] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2756.105772] EXT4-fs (loop2): mount failed [ 2756.163932] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2756.167755] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2756.171008] EXT4-fs (loop2): mount failed 23:46:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:46:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:46:18 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="e2ab80f6c85a563f40244f210700"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) bind$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x7f0, @any, 0xff, 0x2}, 0xe) 23:46:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendfile(r4, r0, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) process_vm_readv(r1, &(0x7f0000000300)=[{&(0x7f00000003c0)=""/245, 0xf5}, {&(0x7f00000000c0)=""/21, 0x15}, {&(0x7f0000000280)=""/62, 0x3e}, {&(0x7f00000004c0)=""/231, 0xe7}], 0x4, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/62, 0x3e}, {&(0x7f00000005c0)=""/72, 0x48}, {&(0x7f0000000640)=""/141, 0x8d}, {&(0x7f0000000700)=""/209, 0xd1}, {&(0x7f0000000800)=""/185, 0xb9}], 0x5, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:46:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x300000000000000, 0x0) 23:46:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100018, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:46:18 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:46:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x100000000000000) [ 2769.588808] kauditd_printk_skb: 32 callbacks suppressed [ 2769.588825] audit: type=1326 audit(1703634378.528:4933): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2769.605045] audit: type=1326 audit(1703634378.541:4934): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2769.608979] FAT-fs (loop1): Directory bread(block 6) failed [ 2769.625771] audit: type=1326 audit(1703634378.541:4935): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2769.631940] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2769.633594] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2769.635121] audit: type=1326 audit(1703634378.542:4936): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2769.636648] EXT4-fs (loop2): mount failed 23:46:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100020, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2769.675995] FAT-fs (loop4): Directory bread(block 6) failed [ 2769.676010] audit: type=1326 audit(1703634378.543:4937): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2769.676072] audit: type=1326 audit(1703634378.543:4938): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2769.682421] audit: type=1326 audit(1703634378.543:4939): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2769.685975] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2769.687435] audit: type=1326 audit(1703634378.562:4940): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2769.687846] FAT-fs (loop1): Filesystem has been set read-only [ 2769.690345] audit: type=1326 audit(1703634378.562:4941): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2769.696489] audit: type=1326 audit(1703634378.562:4942): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33541 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2769.703877] Bluetooth: hci7: link tx timeout [ 2769.705925] Bluetooth: hci7: killing stalled connection 11:aa:aa:aa:aa:aa [ 2769.712837] FAT-fs (loop4): Directory bread(block 6) failed [ 2769.719080] FAT-fs (loop4): Directory bread(block 6) failed [ 2769.727955] FAT-fs (loop4): Directory bread(block 6) failed [ 2769.764587] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2769.768985] EXT4-fs (loop0): get root inode failed [ 2769.770258] EXT4-fs (loop0): mount failed 23:46:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2769.891965] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2769.907277] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:46:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x200000000000000) 23:46:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x400000000000000, 0x0) 23:46:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2769.926634] EXT4-fs (loop2): mount failed [ 2769.985747] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2769.990885] EXT4-fs (loop0): unsupported descriptor size 0 [ 2769.991936] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2769.996556] FAT-fs (loop4): Directory bread(block 6) failed 23:46:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2770.019052] EXT4-fs (loop2): mount failed [ 2770.026164] FAT-fs (loop4): Directory bread(block 6) failed [ 2770.031330] FAT-fs (loop4): Directory bread(block 6) failed 23:46:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x400000000000000) [ 2770.044014] FAT-fs (loop4): Directory bread(block 6) failed 23:46:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:46:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10002d, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2770.128495] EXT4-fs (loop0): unsupported descriptor size 0 [ 2770.145375] FAT-fs (loop1): Directory bread(block 6) failed [ 2770.161447] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2770.163344] FAT-fs (loop1): Filesystem has been set read-only [ 2770.238897] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2770.241519] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2770.247755] EXT4-fs (loop2): mount failed [ 2770.290048] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2770.297192] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2770.307521] EXT4-fs (loop2): mount failed [ 2770.421863] Bluetooth: hci7: link tx timeout [ 2770.423041] Bluetooth: hci7: killing stalled connection 11:aa:aa:aa:aa:aa [ 2771.717660] Bluetooth: hci7: command 0x0406 tx timeout 23:46:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x500000000000000) 23:46:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x500000000000000, 0x0) 23:46:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000480)=ANY=[@ANYBLOB="0102000000222a66a60000000061abcc634854f280833738f60dbe0000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$BTRFS_IOC_QGROUP_CREATE(r7, 0x4010942a, &(0x7f0000000280)={0x0, 0x3}) pwrite64(r6, &(0x7f00000003c0)="dbe86e4b4c20240f30c3354f568e30d9139442312cfb686d223e83bb381c0b4f9d08a0f412119e5dfeba75ff37ce2f2a17b86910618ebfb05f6d421124727b9bc7336331f78da2c268612b532f6699bbed8d6588250b8f5e0cea17dbb063bf1dbfb5f79aa458dd71e1147799c1d7773c2e29a5cba1da02815c310e863cc5fccbcce17c066924497870d1f8d6c37c0d885dad02c849d0c37c05ac96f86919c79eb79eeb6a6dd6", 0xa6, 0x6) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) getpeername$unix(r4, &(0x7f0000000300)=@abs, &(0x7f00000000c0)=0x6e) 23:46:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:46:35 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:46:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10002e, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:46:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00352078f79bdce1e7c6f05a47056e8ab39d2257d623934c0728c371fadc0bc030163cafadbf63dee536e5f5ef0acf2cc679843271f1bc71"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x2000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r4, r6, 0x0, 0x80000001) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000040)={0x3, 0xe813, 0x1, 0x3, 0x8}) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:46:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f61060100", 0x1e, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2786.149932] kauditd_printk_skb: 10 callbacks suppressed [ 2786.149950] audit: type=1326 audit(1703634395.088:4953): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2786.155729] audit: type=1326 audit(1703634395.090:4954): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2786.162533] audit: type=1326 audit(1703634395.092:4955): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2786.172752] audit: type=1326 audit(1703634395.096:4956): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2786.178480] audit: type=1326 audit(1703634395.096:4957): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2786.190174] FAT-fs (loop1): Directory bread(block 6) failed [ 2786.191908] audit: type=1326 audit(1703634395.096:4958): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2786.208916] EXT4-fs (loop0): unsupported descriptor size 0 [ 2786.211214] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2786.213331] FAT-fs (loop1): Filesystem has been set read-only [ 2786.218081] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.229456] audit: type=1326 audit(1703634395.096:4959): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2786.234463] audit: type=1326 audit(1703634395.101:4960): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2786.239388] audit: type=1326 audit(1703634395.102:4961): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2786.242127] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.244143] audit: type=1326 audit(1703634395.102:4962): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33722 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2786.257261] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2786.261506] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2786.267746] EXT4-fs (loop2): mount failed [ 2786.284272] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.308892] FAT-fs (loop4): Directory bread(block 6) failed 23:46:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2786.332945] Bluetooth: hci7: link tx timeout [ 2786.333968] Bluetooth: hci7: killing stalled connection 10:aa:aa:aa:aa:aa [ 2786.335474] Bluetooth: hci7: link tx timeout [ 2786.336429] Bluetooth: hci7: killing stalled connection 11:aa:aa:aa:aa:aa 23:46:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x600000000000000) [ 2786.389381] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:46:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2786.426400] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2786.431210] EXT4-fs (loop2): mount failed 23:46:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x600000000000000, 0x0) [ 2786.527210] EXT4-fs (loop0): unsupported descriptor size 0 23:46:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100048, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2786.665834] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.677979] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.685870] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2786.691283] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.696963] FAT-fs (loop4): Directory bread(block 6) failed [ 2786.702599] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2786.717474] EXT4-fs (loop2): mount failed [ 2786.769371] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2786.772233] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2786.795288] EXT4-fs (loop2): mount failed [ 2788.357733] Bluetooth: hci7: command 0x0406 tx timeout 23:46:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2ffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:46:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2, 0x50, r0, 0x0) syz_io_uring_setup(0x19d1, &(0x7f0000000300)={0x0, 0x7ed2, 0x4, 0x0, 0x1f8, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000280)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000800)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r2, 0x0, &(0x7f00000007c0)={&(0x7f00000003c0)=@l2tp={0x2, 0x0, @remote, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000440)="e7520291df8304227cffab4f3453e8f134c8253403b4e701d72bf77ffd36ecbdc388cc2ea0bad69cdf298709d02bb6e2f7a1a42c7b0a3e60ef9fd1c82a8e20ab814a392df65b909d01304ac778d47c67c47527c3648a1572f85e0cfd56a032e021124a8ab20cafbdac74601f0ea90488ce0a0e49115a63ecfab52bf0cb6251fe434ff1459062f806cff1686764f88495e66ee504bba18d5225d55fe77d2f9518a51ddeb12a773904", 0xa8}], 0x1, &(0x7f0000000540)=[{0x60, 0x88, 0x2, "76a6ac1d951b941d52f3ec320200f65b5b9e75504cb7407d847053af717b000be6f8286e6104ea225c1458bd55703a892d5719f0141c6bcdda8b6c8e44de0bf431339ebebdefc9b93e4308d31f76"}, {0xc0, 0x103, 0x0, "775e77de22bcd69c5b3e2222b1b7f8a66973d1f4ac4236c71c2681290084fa81358c3f08c12f20dce61e6d039755557eda91bb2de9144288010f022f88515e0f147c4399451429f38e3c0998878a63bf62280b24a1b197ad394368959969d55939861a8af8d438977a32acb1cc5e6e9aac7037df3604fd55fca658487a46db6c62a3ebd069af24dac872d175cea054d074378172fce0c7daa3f8770cdf9289b1eba1f51bb532f5c6aad080a556"}, {0x100, 0x10e, 0x9, "26b45940bd3118e7229fd7822fa02cb331516e477fa086af0798e8922450a2284fde05a1400005e2cf88af89e89d4ed527ebfca0b3ce9a36046098c055d9595ff98f81e53941b171105f2ef2c8d105c8816f114cb8e272a608dff348fda02be55615ef259a2a86566f8e55c8327e552c836aa94c08e8dd0f451f6eb96a03f25ccf9e6d6e3d13aa7c414a728f685d8804362f11922f03a9c052d4bc64959bd7f4acf7b1b80844d6bfb6a8545cd34ad6b44b953a1b938d19660c45f649a2562775f26e1611d639d62e99508e68d983637f07945d96f81a4370698d0e24350996a57f6b667402bf9519294ddcfcf6"}, {0x40, 0x10c, 0x8001, "e3cbc207663fe50175687df50576bd5e65500fd5db6e7e4889a154f6e922e349749d1ad121e5bd162a57"}], 0x260}, 0x0, 0x20000001}, 0x7ff) 23:46:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0xbd48, @none, 0x1}, 0xe) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x20, 0xaa, 0x40, 0x9, 0x0, 0x6, 0xa0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000280), 0xb}, 0x2240, 0x7, 0x7ff, 0x0, 0x3, 0x3, 0x81, 0x0, 0x7fffffff, 0x0, 0xffffffffffffff7f}, 0x0, 0x6, r5, 0x1) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:46:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x700000000000000, 0x0) 23:46:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xc00000000000000) 23:46:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10004c, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:46:49 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2800.680688] kauditd_printk_skb: 9 callbacks suppressed [ 2800.680707] audit: type=1326 audit(1703634409.620:4972): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.687471] audit: type=1326 audit(1703634409.620:4973): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.692141] audit: type=1326 audit(1703634409.620:4974): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.714236] audit: type=1326 audit(1703634409.621:4975): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.718959] EXT4-fs (loop0): unsupported descriptor size 0 [ 2800.721176] FAT-fs (loop4): Directory bread(block 6) failed [ 2800.726064] FAT-fs (loop1): Directory bread(block 6) failed [ 2800.732224] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2800.734466] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2800.735546] FAT-fs (loop1): Filesystem has been set read-only [ 2800.737462] FAT-fs (loop4): Directory bread(block 6) failed [ 2800.738795] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2800.738924] FAT-fs (loop4): Directory bread(block 6) failed [ 2800.748161] EXT4-fs (loop2): mount failed 23:46:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1200000000000000) [ 2800.776016] FAT-fs (loop4): Directory bread(block 6) failed [ 2800.779290] audit: type=1326 audit(1703634409.621:4976): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.782332] audit: type=1326 audit(1703634409.622:4977): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2800.787960] audit: type=1326 audit(1703634409.622:4978): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2800.793359] audit: type=1326 audit(1703634409.622:4979): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2800.796232] audit: type=1326 audit(1703634409.622:4980): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2800.801298] audit: type=1326 audit(1703634409.622:4981): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=33887 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:46:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2800.850038] EXT4-fs (loop0): unsupported descriptor size 0 [ 2800.850839] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:46:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3015, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2800.872320] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2800.905354] EXT4-fs (loop2): mount failed [ 2800.933746] FAT-fs (loop1): Directory bread(block 6) failed [ 2800.935460] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2800.936508] FAT-fs (loop1): Filesystem has been set read-only 23:46:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf00000000000000, 0x0) 23:46:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1800000000000000) 23:46:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10005c, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2801.017220] FAT-fs (loop4): Directory bread(block 6) failed [ 2801.026133] FAT-fs (loop4): Directory bread(block 6) failed [ 2801.026646] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2801.028801] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2801.031737] FAT-fs (loop4): Directory bread(block 6) failed [ 2801.032340] EXT4-fs (loop2): mount failed [ 2801.039590] FAT-fs (loop4): Directory bread(block 6) failed 23:46:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2801.113751] FAT-fs (loop1): Directory bread(block 6) failed [ 2801.118041] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2801.119095] FAT-fs (loop1): Filesystem has been set read-only [ 2801.123990] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2801.127553] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2801.131939] EXT4-fs (loop2): mount failed [ 2802.757724] Bluetooth: hci7: command 0x0405 tx timeout [ 2806.213676] Bluetooth: hci5: command 0x0409 tx timeout [ 2808.261647] Bluetooth: hci5: command 0x041b tx timeout [ 2810.309653] Bluetooth: hci5: command 0x040f tx timeout [ 2810.651759] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2810.653713] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2810.656227] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2810.714430] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2810.716348] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2810.718947] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2812.358658] Bluetooth: hci5: command 0x0419 tx timeout [ 2814.406654] Bluetooth: hci5: command 0x0411 tx timeout 23:47:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:47:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1300000000000000, 0x0) 23:47:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100060, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2825.111736] kauditd_printk_skb: 12 callbacks suppressed [ 2825.111755] audit: type=1326 audit(1703634434.049:4994): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:47:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x1930000000000000) 23:47:14 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:47:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/vtconsole', 0x80000, 0x2) mmap$IORING_OFF_CQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x200000e, 0x18010, r4, 0x8000000) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x4000) r6 = epoll_create(0x7ffd) readv(r6, &(0x7f0000000100), 0x1000000000000073) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r6, 0x40089416, &(0x7f00000001c0)=r7) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000001080)={{r5}, r7, 0x2, @unused=[0x40, 0x8000, 0x5, 0x6], @devid}) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2825.129158] audit: type=1326 audit(1703634434.068:4995): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2825.145525] audit: type=1326 audit(1703634434.076:4996): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2825.160166] audit: type=1326 audit(1703634434.080:4997): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2825.167942] audit: type=1326 audit(1703634434.084:4998): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2825.177308] audit: type=1326 audit(1703634434.093:4999): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2825.187385] audit: type=1326 audit(1703634434.095:5000): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2825.211297] FAT-fs (loop1): Directory bread(block 6) failed [ 2825.218552] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.224300] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2825.226492] FAT-fs (loop1): Filesystem has been set read-only [ 2825.239188] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2825.249808] FAT-fs (loop4): Directory bread(block 6) failed 23:47:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2825.254376] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2825.262414] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.271225] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.273096] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2825.296664] EXT4-fs (loop2): mount failed [ 2825.322206] audit: type=1326 audit(1703634434.096:5001): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2825.347164] audit: type=1326 audit(1703634434.098:5002): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2825.352583] audit: type=1326 audit(1703634434.099:5003): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34516 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:47:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x1800000000000000, 0x0) 23:47:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x3f00000000000000) [ 2825.417098] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:47:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2825.425723] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2825.437252] EXT4-fs (loop2): mount failed 23:47:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2825.502619] FAT-fs (loop1): Directory bread(block 6) failed [ 2825.516523] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2825.519370] FAT-fs (loop1): Filesystem has been set read-only [ 2825.530027] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 23:47:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100068, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2825.542546] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.549402] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.551922] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.561610] FAT-fs (loop4): Directory bread(block 6) failed 23:47:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xf6ffffff00000000) 23:47:14 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:47:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2825.663721] FAT-fs (loop1): Directory bread(block 6) failed 23:47:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xe5ffffff00000000, 0x0) [ 2825.676170] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:47:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6103, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2825.683923] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2825.691363] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2825.691755] EXT4-fs (loop2): mount failed [ 2825.693293] FAT-fs (loop1): Filesystem has been set read-only [ 2825.699542] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2825.742967] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2825.750771] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2825.756167] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2825.761798] EXT4-fs (loop2): mount failed [ 2825.826607] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.831554] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.837401] FAT-fs (loop4): Directory bread(block 6) failed [ 2825.843350] FAT-fs (loop4): Directory bread(block 6) failed 23:47:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:47:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10006c, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:47:29 executing program 6: r0 = socket(0x10, 0xa, 0x9) getsockopt$WPAN_SECURITY_LEVEL(r0, 0x0, 0x2, &(0x7f00000000c0), &(0x7f0000000280)=0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r1, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES64=r1, @ANYBLOB="42378209000000515720"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000500)=ANY=[@ANYRESOCT=r0, @ANYRES32=r3, @ANYBLOB="0600000007000000000000004dc4ecb03c98df861669628300000000"]) r4 = getpid() process_vm_readv(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x19d1c2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) signalfd4(r0, &(0x7f0000000280)={[0x1]}, 0x8, 0x800) r5 = openat(r3, &(0x7f00000002c0)='./file1\x00', 0x40a200, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) sendfile(r5, 0xffffffffffffffff, 0x0, 0x80000001) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r5, &(0x7f00000000c0)={0x2}) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xf6ffffff00000000, 0x0) 23:47:29 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:47:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xffffffff00000000) [ 2840.119683] kauditd_printk_skb: 31 callbacks suppressed [ 2840.119702] audit: type=1326 audit(1703634449.059:5035): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2840.126385] audit: type=1326 audit(1703634449.060:5036): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2840.156783] audit: type=1326 audit(1703634449.061:5037): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2840.169359] audit: type=1326 audit(1703634449.061:5038): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2840.180413] audit: type=1326 audit(1703634449.066:5039): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2840.205329] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2840.214807] FAT-fs (loop4): Directory bread(block 6) failed [ 2840.221244] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2840.226409] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2840.231897] FAT-fs (loop4): Directory bread(block 6) failed [ 2840.236352] FAT-fs (loop1): Directory bread(block 6) failed [ 2840.244768] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2840.246930] FAT-fs (loop1): Filesystem has been set read-only [ 2840.250073] FAT-fs (loop4): Directory bread(block 6) failed [ 2840.255054] EXT4-fs (loop2): mount failed [ 2840.256245] FAT-fs (loop4): Directory bread(block 6) failed [ 2840.277979] audit: type=1326 audit(1703634449.066:5040): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2840.284567] audit: type=1326 audit(1703634449.066:5041): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2840.289207] audit: type=1326 audit(1703634449.066:5042): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2840.294210] audit: type=1326 audit(1703634449.072:5043): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2840.298697] audit: type=1326 audit(1703634449.076:5044): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34807 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:47:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2840.386407] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 23:47:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0xfffffffffffff000) 23:47:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xffffffff00000000, 0x0) 23:47:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:47:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100074, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:47:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0xfffffffffffff000, 0x0) 23:47:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7282, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2840.573122] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2840.585037] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2840.589211] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2840.596330] EXT4-fs (loop2): mount failed [ 2840.677318] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2840.680403] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2840.688351] EXT4-fs (loop2): mount failed 23:47:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x2) 23:47:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00@\x00\x00\x00\x00\x00']) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:47:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101802, 0x34) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) io_uring_enter(r1, 0x4427, 0xf861, 0x0, &(0x7f0000000500)={[0x9]}, 0x8) truncate(&(0x7f0000001040)='./file1\x00', 0x4) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000280)="24e3c47e4e813892b162b7b3a40f05c0c5c827a236e680", 0x17, 0x9}], 0x2, &(0x7f0000000540)=ANY=[@ANYBLOB="6769643d255ebab7ec4fceeb62731c0ae615a7e600c447628aa423242ccbc758d530a2c80acd241aed6d7c0bdf7e1af8b4489c736e312f86e16cec0534", @ANYRESHEX=r2, @ANYBLOB=',mode=00000000000000000000100,fowner<', @ANYRESDEC=r3, @ANYBLOB=',defcontext=user_u,\x00']) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00']) r4 = getpid() process_vm_readv(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) open$dir(&(0x7f00000004c0)='./file0\x00', 0xa0000, 0xc) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r2 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/163, 0xa3}, {&(0x7f0000000300)=""/105, 0x69}], 0x2) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:42 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:47:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10007a, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:47:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2853.962653] kauditd_printk_skb: 9 callbacks suppressed [ 2853.962671] audit: type=1326 audit(1703634462.902:5054): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2853.974049] audit: type=1326 audit(1703634462.913:5055): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2853.990680] audit: type=1326 audit(1703634462.921:5056): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2854.001004] tmpfs: Bad value for 'gid' [ 2854.004155] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2854.008986] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.027091] FAT-fs (loop1): Directory bread(block 6) failed [ 2854.029767] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.030798] audit: type=1326 audit(1703634462.942:5057): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2854.034624] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.044401] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2854.046459] FAT-fs (loop1): Filesystem has been set read-only [ 2854.051217] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2854.055812] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.062206] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2854.062885] audit: type=1326 audit(1703634462.944:5058): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2854.082304] EXT4-fs (loop2): mount failed [ 2854.116014] audit: type=1326 audit(1703634462.944:5059): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2854.122401] audit: type=1326 audit(1703634462.952:5060): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2854.132165] audit: type=1326 audit(1703634462.981:5061): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2854.134732] Bluetooth: hci5: link tx timeout [ 2854.138132] Bluetooth: hci5: killing stalled connection 11:aa:aa:aa:aa:aa [ 2854.138209] audit: type=1326 audit(1703634462.988:5062): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2854.145648] audit: type=1326 audit(1703634462.988:5063): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=34971 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:47:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:47:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb3c906d6b66732e663c86880c0ef06661740002080100024000806a9cc5cad4", 0x20}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='e&']) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2854.215383] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2854.235963] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2854.240707] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 23:47:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x3) [ 2854.250322] EXT4-fs (loop2): mount failed [ 2854.324612] FAT-fs (loop1): Unrecognized mount option "e&" or missing value 23:47:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2854.390266] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.393301] FAT-fs (loop1): Unrecognized mount option "e&" or missing value 23:47:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2854.411023] FAT-fs (loop4): Directory bread(block 6) failed 23:47:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2854.429019] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.436156] FAT-fs (loop4): Directory bread(block 6) failed [ 2854.488545] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2854.793056] Bluetooth: hci5: link tx timeout [ 2854.794065] Bluetooth: hci5: killing stalled connection 11:aa:aa:aa:aa:aa [ 2856.198642] Bluetooth: hci5: command 0x0406 tx timeout 23:47:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000280)='net/ptype\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:47:58 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:47:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000f200000018000000", @ANYRESHEX, @ANYRES64]) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=[{&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/69, 0x45}, {&(0x7f0000000240)=""/114, 0x72}, {&(0x7f0000000300)=""/77, 0x4d}, {&(0x7f00000003c0)=""/217, 0xd9}], 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000008, 0x13, r0, 0x8000000) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd, 0x3, 0x0, 0x7, 0x4}, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index=0xa, 0x0, {}, 0xfffffffc, 0x1, 0x1, {0x0, 0x0, r6}}, 0x9) 23:47:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:47:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100112, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:47:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x4) 23:47:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8106, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:58 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x9c86}], 0x1212002, &(0x7f0000010d00)=ANY=[@ANYBLOB='\x00']) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180), &(0x7f0000000240)={0x0, 0xfb, 0xd4, 0x5, 0x8, "a519c68fc95c3a0227dd87d3dc31aac4", "2f802dbfcde3fc55b0271d6e52e3b60a73b29667e8410561082e571c55a0e1506b74287646b8b53602e305cf6b5445836c76ce7eb41f52986688f0157b1c3cc7f0b95d4e5cfa06cbbb932db6f4b56670655e59459980f74d2ae36cc701d4383ad9d875a2a25b2391157ca7c46b4ab78d282b0a487f9c2819683c3decef21d519a6b266b2d796fc9d513e8482269ae777e054c6b3bfbdd14fefa9f7def1163e3b7be32d931895f4cbaf422cc82d9dd0686cdd21136fe217a02bd71f9763b785"}, 0xd4, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) dup2(r0, r0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000001700), 0x6e, &(0x7f0000001780), 0x0, &(0x7f00000017c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x10102) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = getpgid(0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x8, 0x0, 0x0, @pid=r4}]}, 0x24}}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r5, r7, 0x0, 0x80000001) openat$binderfs(0xffffffffffffff9c, &(0x7f0000001880)='./binderfs2/binder1\x00', 0x802, 0x0) syz_mount_image$tmpfs(&(0x7f00000018c0), &(0x7f0000001900)='./file0/file0\x00', 0x3d9, 0x2, &(0x7f0000001b00)=[{&(0x7f0000001940)="502b0fac25bbec9d8241b7d0be0f9bdf9b91c5932916fec23aef31cf99217beae25c1236c6968f6e303795b2f8e0b39fa97a3294fa6cfa6418e12246b9ef9652f8ba4d85596a209a981ba93c6bcac55e7b94e3db2fc7617ab3929f82200ea78fd73c6e8853fe0d3bf70459e940ba64904fb16681e23c3b26f0d9ffcb954284c68b9fc6a5b508177ccb87a9181c52d927f721934f2a659eab5bc9e9746bcaf31008a948b04c8c58bd72800761421c4201bce4b18b80954163677b6ab823da800eaee4134c9ee384d067736d94510444d0dbfd2915e97ba16302e29ce0b23b05775cda4d7d0b8de4abcc9e3c584cead25b2d", 0xf1, 0x5}, {&(0x7f0000001a40)="4cd075ab4f4c5f48d906b48298f7db9cd1abb415d408c7e0e8ecfb95c74cab9f007b276f0ae6be4cdaf25d647e3a60ea08e9dfd9f4725c69d7a9952b54271084c3da08a18161bab7a68d2ab476467e5471dbd279206be3d0c9c7016ae0607f134bcbece6a60bc2dabc7435604c14167f523d377c597a761342a33d7160a4d1a706", 0x81, 0x100000000}], 0x2000001, &(0x7f0000001b40)=ANY=[@ANYBLOB='huge=within_size,huge=never,seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',uid<', @ANYRESDEC=0xee01, @ANYBLOB=',uid<', @ANYRESDEC, @ANYBLOB="2c610100000000000000747970653d696d617369672c61756469742c08"]) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000003c0)="4373ed110c5f8f0190cdb92de015352fbb9048082fc73600e8fd572d76a1c21bb9e29b99e08ef483adf6d2c8f51073cdd17614af9c4b2f0ac38e060ac30303968104117c0d4453e262725dc04d2059516ba6e9cadcb3c12a26", 0x59}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="805917b4a660a9c64ac2590d6d33b34373d02e963c26b62d1d48757851821434a4f6aa393b780dbfe47ce54276d50f855954453cf63f49a1345e6df62e16e20c2ae4e8711cc29c68523dc289c9ab7dd81cc61f9e594589e3b03657aad326d5fdbf260353a8a834c5dc3a3ab56f628867f3c84f7f88e35c10edfd563f84367ad7f5e73a3ce0cca23f415fa64046b137bf3149924cea7cfea54da1a155f5f9804ff12062b2533edc897e16f5860a91fbd35b45ba053e37", 0xb6}, {&(0x7f00000001c0)="78a997a3a42544942cac6cf9334b19366e79cd", 0x13}, {&(0x7f0000001500)="fa63c679bdcb4c14166d95f82cdba93bf544184205de4a929e8f2f9b2e5aad77a837f25415071ff2f1a292a74898321df46cc4d6c4ab456a4143ebea96042011c9281973f0690796fa2d4c04e3291945e5e97258967692f163c633aa6bd122851c675be849de563f8c4440b3db391659d35aebe0be3e74843380f93132f06bd3385f833294c2689d3e825ef9c2fc503a8d1ac0ce69c621ee0313e74d8ecb07aa8b23f19b8defe93b466ba074611aedb80f0a0a3464b6003a40d725122d79c55232146012cbed5a41942a68387cc3f05f2e05cca6c7", 0xd5}, {&(0x7f0000001600)="4d09dc7707004c47c5ac67cb67afccc697844f62520b15f3a78a4c67fa2a68de493c52f1d1145e02a5c0a720fcf02aebfe35460fc01e9d97189fc211b1b0d4b943688ce964f1440ecb2e", 0x4a}], 0x6, &(0x7f0000001c00), 0x0, 0x24000084}, 0x20040000) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2869.298894] kauditd_printk_skb: 9 callbacks suppressed [ 2869.298907] audit: type=1326 audit(1703634478.239:5073): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2869.303453] audit: type=1326 audit(1703634478.239:5074): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2869.315331] audit: type=1326 audit(1703634478.255:5075): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2869.326684] audit: type=1326 audit(1703634478.255:5076): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2869.342529] audit: type=1326 audit(1703634478.264:5077): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2869.363145] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2869.366704] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.372951] audit: type=1326 audit(1703634478.265:5078): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2869.387708] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.390824] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.406766] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.411461] Bluetooth: hci5: link tx timeout [ 2869.412668] Bluetooth: hci5: killing stalled connection 11:aa:aa:aa:aa:aa [ 2869.422483] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2869.435116] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:47:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2869.449251] EXT4-fs (loop2): mount failed [ 2869.465246] tmpfs: Unsupported parameter 'huge' 23:47:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8272, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2869.468804] audit: type=1326 audit(1703634478.265:5079): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2869.479246] audit: type=1326 audit(1703634478.266:5080): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2869.482403] audit: type=1326 audit(1703634478.266:5081): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2869.485318] audit: type=1326 audit(1703634478.271:5082): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35130 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:47:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x5) [ 2869.543273] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2869.563674] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2869.568122] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2869.576482] EXT4-fs (loop2): mount failed 23:47:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a", 0x90, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2869.625188] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.637222] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.642064] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.647320] FAT-fs (loop4): Directory bread(block 6) failed 23:47:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9102, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:47:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1001ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:47:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x6) [ 2869.759555] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2869.763793] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2869.767318] EXT4-fs (loop0): get root inode failed [ 2869.767896] EXT4-fs (loop0): mount failed [ 2869.773005] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2869.787286] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.790125] EXT4-fs (loop2): mount failed [ 2869.793896] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.803294] FAT-fs (loop4): Directory bread(block 6) failed 23:47:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9c02, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2869.807665] FAT-fs (loop4): Directory bread(block 6) failed [ 2869.853639] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2869.862114] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2869.869508] EXT4-fs (loop2): mount failed 23:48:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x7) 23:48:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fcntl$setown(r3, 0x8, r4) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:48:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x1, 0x100000001, 0x9) 23:48:13 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:48:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe503, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:48:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100291, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:48:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ec02627b211d0c408c4e02e4f08c0db6b2622cd832702b423c71a4ae3aed6c0c6bfeb12f0f001b5f32fc88d7d4989848a27a923c8f68ee792658c6a6ddcffe585e8df8038bdd4295bc167346204d1c0afe5cd0d8fe2c3d50009f37fd459aca5ee12cd8515b56d026a5b2071112be17b7328df9f3e2384864df0b4e6635216a40a8fc380500000000000000cebfe2d642"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000000c0)={0x3, 0x0, 0x5, 0x1, 0xfffffff7}) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2884.389635] kauditd_printk_skb: 10 callbacks suppressed [ 2884.389654] audit: type=1326 audit(1703634493.329:5093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.395142] audit: type=1326 audit(1703634493.329:5094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.402908] audit: type=1326 audit(1703634493.341:5095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.407954] audit: type=1326 audit(1703634493.343:5096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.412602] audit: type=1326 audit(1703634493.343:5097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.418809] audit: type=1326 audit(1703634493.353:5098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2884.423364] audit: type=1326 audit(1703634493.353:5099): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2884.427904] audit: type=1326 audit(1703634493.353:5100): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2884.435360] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.444345] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.449372] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2884.450080] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.454741] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2884.458304] FAT-fs (loop1): Directory bread(block 6) failed [ 2884.459278] EXT4-fs (loop2): mount failed [ 2884.463273] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2884.472520] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.479961] audit: type=1326 audit(1703634493.353:5101): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2884.484501] audit: type=1326 audit(1703634493.353:5102): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35320 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2884.486103] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2884.490682] FAT-fs (loop1): Filesystem has been set read-only [ 2884.505878] Bluetooth: hci5: link tx timeout [ 2884.506842] Bluetooth: hci5: killing stalled connection 10:aa:aa:aa:aa:aa [ 2884.508314] Bluetooth: hci5: link tx timeout [ 2884.509238] Bluetooth: hci5: killing stalled connection 11:aa:aa:aa:aa:aa [ 2884.536731] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2884.541920] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2884.549954] EXT4-fs (loop2): mount failed [ 2884.570486] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:48:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1002ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:48:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:48:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x8) 23:48:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414868b15df24c4c45522020080000e980325132510000e98032510000000000004166806900650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d00000", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2884.710264] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2884.734879] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2884.743709] EXT4-fs (loop2): mount failed [ 2884.749188] FAT-fs (loop1): Directory bread(block 6) failed [ 2884.755495] FAT-fs (loop1): Directory bread(block 6) failed [ 2884.764320] FAT-fs (loop1): Directory bread(block 6) failed [ 2884.804022] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) 23:48:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe2f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2884.843125] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.877247] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.879055] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.885171] FAT-fs (loop4): Directory bread(block 6) failed [ 2884.914187] EXT4-fs: failed to create workqueue [ 2884.915266] EXT4-fs (loop2): mount failed [ 2886.533656] Bluetooth: hci5: command 0x0406 tx timeout 23:48:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100300, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:48:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xe) 23:48:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000001) openat(r2, &(0x7f0000000280)='./file1\x00', 0x40, 0x1b3) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) fstat(r4, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000000c0)='./file0\x00', r6, 0xee01) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:48:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:48:28 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:48:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000540)=0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000280)='./file1\x00', 0x38c, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000300)="796859d7a998dc35ddef0598e11ae2cd70fd7c9280a08af70657e24cedb38f933a870204eccd12eefd8b60c0cb83e186de8980d3352e70289b10a1e8e03f", 0x3e, 0x5}, {&(0x7f0000000340)="f0bc2dec5f57eb799d102b3f3be541fabf1b6b", 0x13, 0x221}], 0x2, &(0x7f0000000580)={[{@huge_within_size}, {@uid={'uid', 0x3d, r1}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, '*}'}}, {@fowner_gt={'fowner>', r2}}, {@dont_measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '}]\\]@$&'}}, {@euid_gt={'euid>', r3}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@euid_lt={'euid<', r4}}]}) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r5 = getpid() process_vm_readv(r5, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:48:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x17, 0x0, 0x5, 0x40, 0x2, 0x3, 0x3, 0x187, 0x40, 0x29a, 0x2, 0x7, 0x38, 0x1, 0x1, 0x4a1, 0x25}, [{0x3, 0xffff, 0x3945, 0xfff, 0x1, 0x5, 0x1, 0x4}, {0xaf6a7ab82bd25655, 0x1, 0x1, 0x6, 0x7, 0x0, 0x401, 0x6}], "d454746e39a953b85e39800f6f52196743a4fd0a55f7ac9f946fb412327abe3c0fb7d5d30671f4c42a021d31b6a1e6b901647bd59505e03a719354c0c8f3de59b74ed5072df19bfe389a08604b2d76d9f873dcc3e82d0ebc1795e5771e63c6c5342dde78394670b6c332542c1ab3b3214274a43ff66622e50828e910705ef2eb5f5ef912d0871b3a0e53341d2c90515d14631f4876a9eddef8693c675867b95d8445b4eb89753aed93793d11146d55611dd0aa98ddcbe1a666800d6245a926f9721335a9326ae90f8e03e771f167e872681896bb802585c7d90b61a58d151bc5e3c4d8663d4490419c6c1b0af5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x79d) [ 2899.792384] FAT-fs (loop1): Directory bread(block 6) failed [ 2899.811211] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2899.813169] FAT-fs (loop1): Filesystem has been set read-only [ 2899.819142] kauditd_printk_skb: 12 callbacks suppressed [ 2899.819159] audit: type=1326 audit(1703634508.759:5115): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2899.828157] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2899.831427] audit: type=1326 audit(1703634508.766:5116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2899.841346] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2899.844934] audit: type=1326 audit(1703634508.767:5117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2899.852731] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2899.854239] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2899.867812] EXT4-fs (loop2): mount failed [ 2899.879858] audit: type=1326 audit(1703634508.767:5118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2899.886320] FAT-fs (loop4): Directory bread(block 6) failed [ 2899.900895] FAT-fs (loop4): Directory bread(block 6) failed [ 2899.906037] audit: type=1326 audit(1703634508.777:5119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2899.910752] audit: type=1326 audit(1703634508.780:5120): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2899.915319] audit: type=1326 audit(1703634508.780:5121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2899.919908] audit: type=1326 audit(1703634508.810:5122): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2899.924714] audit: type=1326 audit(1703634508.810:5123): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2899.929289] audit: type=1326 audit(1703634508.810:5124): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35489 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2899.930151] FAT-fs (loop4): Directory bread(block 6) failed 23:48:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) r1 = signalfd(r0, &(0x7f00000000c0)={[0x5]}, 0x8) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000180)=0x1) 23:48:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000300)=""/199, 0xc1}], 0x1, &(0x7f00000000c0)=[{&(0x7f0000003300)=""/4096, 0x528}, {&(0x7f0000002080)=""/4098}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x1}}, './file1\x00'}) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) fallocate(r6, 0x41, 0x7f, 0x7f) accept(r5, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0x80) r7 = socket$inet6_udp(0xa, 0x2, 0x0) pread64(r7, &(0x7f0000000500)=""/218, 0xda, 0x8) 23:48:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300"/120, 0x78, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2899.988998] FAT-fs (loop4): Directory bread(block 6) failed [ 2899.996699] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2900.009262] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2900.022708] FAT-fs (loop1): Directory bread(block 6) failed [ 2900.027047] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2900.028978] FAT-fs (loop1): Filesystem has been set read-only 23:48:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2900.042721] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2900.046401] EXT4-fs (loop2): mount failed 23:48:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf) 23:48:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x3169080, &(0x7f0000000280)={[{@iocharset={'iocharset', 0x3d, 'cp857'}}, {@utf8}, {@rodir}, {@numtail}, {@shortname_win95}], [{@subj_role={'subj_role', 0x3d, '@}}&(@)*'}}, {@pcr={'pcr', 0x3d, 0xb}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, '$(&\''}}, {@obj_type={'obj_type', 0x3d, '&$\']@&'}}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x31) 23:48:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100361, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2900.189947] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2900.203050] FAT-fs (loop4): Directory bread(block 6) failed [ 2900.206722] FAT-fs (loop4): Directory bread(block 6) failed [ 2900.218195] EXT4-fs (loop0): get root inode failed [ 2900.219445] EXT4-fs (loop0): mount failed [ 2900.224742] FAT-fs (loop4): Directory bread(block 6) failed [ 2900.228526] FAT-fs (loop1): Directory bread(block 6) failed [ 2900.234449] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2900.236498] FAT-fs (loop1): Filesystem has been set read-only [ 2900.244147] FAT-fs (loop4): Directory bread(block 6) failed [ 2900.290101] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:48:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40355, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2900.370404] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2900.380125] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2900.387916] EXT4-fs (loop2): mount failed [ 2900.453968] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2900.462006] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2900.472752] EXT4-fs (loop2): mount failed [ 2901.893606] Bluetooth: hci5: command 0x0405 tx timeout 23:48:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/190, 0xbe}], 0x1, &(0x7f0000000380), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000280)='./file1/file0\x00', &(0x7f0000000300), 0x4, &(0x7f00000003c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@msize={'msize', 0x3d, 0x4}}, {@aname={'aname', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@afid={'afid', 0x3d, 0x3f}}, {@cache_loose}], [{@pcr={'pcr', 0x3d, 0x36}}]}}) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r4, r6, 0x0, 0x80000001) ioctl$TIOCGPTPEER(r4, 0x5441, 0xfffffffffffffe00) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:48:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="ade755064cb7e58720377d03c1ebe8ead350e9d3ed785140cabde2f57d04b61fa6a2c88bb55f932ac8d0e78ef9c97ffec045175b66cba2f6200ba6c6cbd100eec84bac16e035645f21ddb1098931eac9dc8674c33cd91b75cf5c05a8ae80e673af2cf45c8576fa32eba5c1304b48e159b44a32e0f03e5c741a70dc347f316748acafb996c42cbeb0b37822b8cd32180142eb3d22c91820f1737bcb2e08cb0223b1a074e5d334b90d7481bc28a4928e2af35134e9632e"]) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:48:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000007dc0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="b06c09b99da57b2aaf576d88b5858b2beb178d5d8fea2e49e8c08f4304c6717a1acaf51c5a5849cd84eaf52e83a4acaf0da247e48686c845da2362d54cbfde1a7c7187329abe8cc772dbcf438f84e02eb2a7105d7032c7d1dfc0f74f9790776343c67f09b0130000"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000007a40)='./file1\x00', 0x18d2fa5b, 0x2, &(0x7f0000007f80)=[{&(0x7f0000007e40)="2feb0f75e9dec7c6ae517e85d46a8f4e872e78", 0x13, 0xffff}, {&(0x7f0000007e80)="344a99b540b96a5fef0a04c6ffb687758c72d85798f6c05d7f1d42b97ba48e7a284fe077f7488037bd62da21c9edbb7c7de4108f9449c6b299a06c155a22e10de8304e121b13f2046a1bf579b1b3aef2f720f92f6d1b839c0e9312d140e0cb1fb3ddab079b834961272de519ed9cb5c5ba369de33ff75b7b0043314d5a589af12d30c45bf0e0509e92cee11e9905cc1d269f0116ee975e637ec9b86e050ac79af433519f28e2a884e93f7b226c8e1f76f287873bdf40a9928b2d995c4a2b0ead5123c0d7829c72c5a8207340117ca6d885b1351682acf4347f094b1af3564f1f8b3a50866e494420e5", 0xe9, 0x4}], 0x0, &(0x7f0000007fc0)={[{@fat=@nfs}, {@fat=@usefree}, {@fat=@showexec}, {@fat=@check_strict}], [{@fsname}, {@obj_type={'obj_type', 0x3d, '%#}\\'}}, {@pcr={'pcr', 0x3d, 0x8}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '.&{}'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfshat={'smackfshat', 0x3d, 'devices.deny\x00'}}]}) openat(r2, &(0x7f00000080c0)='./file1\x00', 0x103080, 0x1) [ 2914.369108] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) sendmmsg(r0, &(0x7f0000007c40)=[{{&(0x7f0000000300)=@llc={0x1a, 0x200, 0x4, 0x7, 0x18, 0x2, @remote}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000003c0)="cb0affe5d5542cade53dad02551e553c6fea89394dcfe7185cb45854915476e6457421444347fd79004ce3e85159e0480eb1365b70a8f3b9fad6223bb1549ceaa0d3f733233126a42934122e54fb2bd707fe427cf6031d6437b6f0d0fd23cb2e7f922e8bab18263da8e84739e9e1c0997f", 0x71}], 0x1, &(0x7f0000008100)=ANY=[@ANYBLOB="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"], 0x1c8}}, {{&(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x1, 0x2, {0xa, 0x4e21, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)="c68857bbefdc22fb7d374e7ecec9767dcb8b6d616463e244dd43d51d2c3231af3c15f2e1eb87945ebfa7cc55f2c53080effda493641f38f25c23cbd63a136dbdcc90fc53812d6297ca", 0x49}, {&(0x7f0000000280)}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000000740)="ab49", 0x2}], 0x4, &(0x7f0000004300)=[{0xf8, 0x1, 0x1, "f412950aec5bc02d765804220eb268d2f80c619fe950a9153facf0a98152ba4e9a039b8757fc67e51c7fbf447573be8e3d25fb1d484948ab75246e6a8c8e28bea1ca2b981bacf011b513805eb0a7714ece01f73846d33c6cd273b57412d1f70f90e83a4f59c2d4ffb07e82e551256fdb9d1208df85aa0a52c7b7d013e04b7d8121809394359818c89a8f140dc1cc65dbcf652ad53897c2be53db3731f7868553193a30d1fb3cca1e487a488b8f47c9be143a56b172eaca49ceaa71f18f19c4cfbfb9785249c744686c2ca95caab8ff6ef36b768987cf6de845cae98bc55d69f735d1"}, {0x1010, 0x10a, 0x3, "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"}, {0x60, 0x1, 0x5, "56cf881f42e52fe643733d135fe3ab5088793e8863db930fff19b3ca5f08beba32b368943333fcb81a1649fe1f0b8d55c154271ef37195ee1ee524549766e385187ee41276f5345a35b81f154dd5"}, {0x10, 0x101, 0x3}, {0xc0, 0x109, 0x4, "231436f5a7291e8e780094ba62316fd5c22b647e496a9783263f0d30248e9d7434a7b3e92b5c72412cb1e2138c12b6f24b01c3d21d71f723693af19f2b4872fdfb99a92b4771f66124278e7c714456e0890af9bb8174dbf00732fde44985ed2f05735a0115215216f93ea62b24f9267c740d30c443c04fb1ecc421b2671f1ec9402a3f1eb955fb418d81a7ea8c31b04c0f0d76756d29bec653447eac6300b334d1ef4501375b38be91faf17c187b"}, {0x1010, 0x104, 0x80000001, "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"}, {0x70, 0x11, 0xad, "a866cf97650f1182d344e40e93fd7a6439386f66f0af22196e28fda225d4b52696a236d31d2f37844352aed5e08b63042dd5f346464794f0ecf91983d9fd13943ab4389d9ef21f0135d7c3bd69546e576cb970d2d34f82346e55e036e151"}], 0x22b8}}, {{&(0x7f00000007c0)=@sco, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000840)="88bc2b9a749b5cc5d7122e21b4e707f347aea6bf532a81a527733807c622ee0a37635924473c84e8b5755134c57bad952b852a189b6652bc3a5f010bae1de32d4e5db4e04c1b61bb15c0e37ae86d9a0bd31eddbe2480f15053d8ec8a6b8ee1d8af4faf5da3805864785a208271c3b914dcea9816e963d784837e71711b1dbcb1fd667c63749867b5fd9dca3d3c9905ed8d093c47832d792e88fcaff08c2ba5893c476d640bddd6606d15c9f3be595821ca7ed2e1a7b7999030dc19c354", 0xbd}, {&(0x7f0000000900)="00d847b092698125a35d8e77ab4a26fccc4d4829b2072277cc8b3e49d393610f890e1afecc652a9837553d9996a194c20ac3", 0x32}, {&(0x7f0000002080)="6f9493b5d0a86c66646cf1d058edc2c55680e327569784a7d31945deda8fdb976803d861101d1e7b9f06bb2ad1e308e201b479e97aba18a36352590562190564992a32f379a1b396193f70618abe04c9c06950f304491d3bcdec4198e3eb38477780051782919546ff20e935e5908e0728b99362cc470535fe06f7a075f63424644bbe196079d184c831d0737f9cc6e7f4cfae234327c0609e3d33c06094de0cf6740ee2635df2a7c8eb877594d6e9b5036c38bca38994abd92277241316e0294e486863ec9d36b65a3bcf726657be3a6e85d42c2d3150b0137ba516cdeb7773004aab09e4aab23c3ff33d4778480299079ec332a3d3cc135137b85152eca3f99dc4d3fe06eca3a8a7246807eed2e6c9c9d4cecc2536991c887eda19cdfa13967b7c16855e29b5b4df585c978cb06f67fb6c30ad545663650f90f2b44354bd06f695ee2d2118590bc2658731c8208359d3f197ec644c7403184eaec541c09f5526f19543327c39b8668b75fdc47e5fd3a33d571845a3457c4df26898dba5e4b889cee0079ad30e2723083e5bfa9a3d70a84c00336b953f4d315e5c569d98372c3ab00a0d254fd5de43cb8c917540e0fa6eb18acfc6dd465f42d4bfa65253fa6aa654c011a82df5238cb1d2c7d471ba6182b2c1c3846e0ff96f6e18b90a7d412211f308529d9f4d6e6dc5790c93306010dbb54748d321e64c422d804683bfcc2f133626bfe2935ff7b9db73ffbeb6f881d0fe32e8c8faabfc00c9eee6d9d0799e635904aae5e88a62abbb7fb3617e8d7d17a1207314d5d500dadb24a9e0b662778a7238bcec9e2af6c71f1901cf412122318ecd446bbbaefa9f846f4b84956ff2ee67a76795d1b2d96f0a1e06b30486f5d50918ebdab6240cd1ab694f8d9f15c7d67b9f6835631fe582091d3a7ce488e66d03b75bc1b27771797d0ea074fffed79bdb407ad51e2b588da2c0e614a261f7958aa40e56428aa3cb8464707cad87587a74c80c605b2445802b09a536e05b232339b68c58ae63f329835247bd08951eac40cc213d56f3d82a40e19856d16435f1c0164b795effebaca185d9a0723d5685e998aba6c5c9af38c9a3151c6d75cf9c4bf2ca49763e391a310087169fe046c939621e86feb00638d03b543e980ae823378632dc35999edd51d14c9ed8f18dc7c2aa051ec71214f318229df2e24f6a154ea5db8fb8b17b2e7f706cee733bbee7048cd4310e63561f088b5d1d6b5f39c7bc33cc9e2eed3b584a24ec01c79a0272ec8f7614906b03642e43f6fffd0710330729f3be99c92e7675be618e39eb7e7b5c30d9741bbd39d601aed7c0f859d2c832c8a4c64a2244a73b6701a7b4f787e82bced68b8ffbf02f408228eedc812a95d28c0eb0a6d87238e9c4e54a1b99e5f10440506067d587fc68df4ce2fa793e6bad7337b77ca3253687977f308dfe9ee5fbcd3c9a4f3c43b63832fa19816dab070fb95e89ec250b83f86ff56917d71c235c5c9bf83f99cbebecf8d4f8d00062f98bfce68d95f82074508a46d27fba1cdc2c8a23d129a40663575d657dfee9cc430f0b7e2705135442745fa65cbf1162a03c0e876fefb06b56a27f2f23e7f40cbc19ec55cedd0a641f0def652d9709c293cc6718b4289199f6d7fd856a8f44b2a39360a34ce99045df89d724ac627491836cc41592e890914e90778da2af5b1c0c49a09b9422165dbe464c326c30eb47396f9a5d757923914fc5421b062daacd910117a98daf9ccc9c988f0fc703a358a6353ac272cf8c5b7b552340cad20107e8a8600202d7d84e050b08544ce0d1151aab274956e3d430c7f66dab22918594298a09247f25f307c81ba8aea8a0d9e81fd01c19b9ae32a6378d9da6d6c53afb56d9e9b5495b32c34f3d33b5dd8eefada2c5ad393c806d236056e8e01836b5abdcf2780381d11550a7e930fed8ba546eb6dbbab244f0b44c1ee5897b13d28eaeae930657fdae28ca9c562995ce042ebe451f3773547fe343345b622dfd387f2df919fe434e4ec66feac8239c5e5b1d0b754e997e6a5ffe845d0126ca06fccc8ae0284853ce4464be11befc6500de6e4220991ed2a9f77835654aa3699dcb6ab2036c3b388c62b47cdb74b143e2a12f1dba20782c39f8b301fae08f8f0dcf14d75fcf29f95b3cfe02d139b7b279b6517d631981d41ec011af50b3e2c94ca5b29a47e24fee9378277b6c2ff8155f19186ec0f76094b47a1622484a43978a29cb6fbaabdfccbf92216b8ffc73e7c170aa2bff962a491c1fe32f2b2e8916b057cc5a5a16fd64b5dfa5a4aaf7d6186e16d49ba7aa2f1353be15cc89d9e44a7f45655c7e6f39449f69fc38448ddbf393ebeeb20a0b2eff96977913b6942b2265cf6627494205c5084c9f5893bea234adb7555b5a843cd06df2542ac6472da09a4828601a81ccc0847eb441f8bca88289185f6cc7eeafb7427fafba6190ed204df4eb2b5c0defedafb45b984254b0d100a78dfd7e6b84f0601efbab53d9f91bd22753d3b01ac4c515ca3e928ad2043cf18161974424e5bbe1ebcd4c9248c75962d5d25dc604b415f6341dd0f59de64ffa37edec09e140c567b70a7741ae4afe420ae7aa6fd7a0ee445146b3bbd75a0b9a2e8171a4f46e519b4bed9dc1b33c3ebac27793d45f992d21f56ee83a3482d5f6816ce606816053478a106d9b18a3f8a9f3abfe25b1cfae3946c6dde732888cea592d852c9a88f3f2d10f34c5e233b2b8cee6448cf3c1785ac95ac850ea4a09b1557c09edf67b4246766f00af7b9eba6a6363324ed287bea28243fc13f645065aefb7de3cd53310b139cbd2268238bc5518c60d00ce45ad656b494c118a25bc247bb2314a9480436c93f88ff4a482ad0a80d587167daed23e278de57377755877ef32c92149982f24144e9c94b09d0b38bd0c41bf8c77b30045aade0b8faec738d018f3f7e4d65e0d6f6a831b9906831a64e9f1584519cd271c33e6ebf3f12d9f7227a1cbe803d9e7f75241934a6767daaf06e140cdeec98d9a4ebed67865b6f40b3fdbac5534b7ed32a5be9b1dfdce7ba91bb4c95670f3cc6f067c9c942d0312c2616bf5864583284f690e282ac912b5b6c8e7310c664885143d9f3039caf52262fae6dbb73dde973ef886f7da00fa607eb0d620ea5a3121ec1b19f885940cd13ffe0bdd7ee6db7db74ecdd6f740c54bc04b354e7619d27aae71105f0275cca744cbd1182ecddc44de7f00e03cad8b8c8ba2fb735059898f0ceb8b4d96d8306560dc2f0b534e1bc59352532da11810a0a0504c4bee0a1dadd95547593d332724972ad32f6f43ba33af000c6ff9affbbc23fb7401e6d286136808acd8cb6b072ba861685cdc367aeb23c787bfe50fc454f346d7bb8fad19a4258adc14988659e93b464a052589cfb55be7e0079ed2c78cc66906e0616b2bec0b039b5b826cf705689625950a1bd7aad6e6472be792700df96cd142967489d56f0224e68235644137276ddc9f5d029473b1fe526d7784b79af6ce4575e45ed3052633ba79b0f77ccc65b658803ea2bc3259b7329b7e3d007d3d23bcac2c1f21449536ff5e842b1e794578cfd7690ca48ae237f293b42d9a8e8958c5d9a727a59fa7d0eb2b455ee0099590f2ef92a000ff0c9a07ec514393c9922b019312f19e0890654a73a773ff577e8c227effbc5679ab7cc992f98840eba52aa1741ca8267cfb129694b6d4776e54460981293e190bf8fc515b797588003078e60aaf75a278093bfe353e86b387bd682154bed22df2c11e8cb2a3bf16f57c05d67dd989156039f26fb6660a98a5ba60ebb6bf799a568f1e346205875cef59ee6bafd742f4ddbcd23b1c1532e2349b37b9466f5b8127b1966f4eea10134718673aca68eb9de2328876b8236b90f775a2247a2dd29179c4c250b8482ba198802e0cc9740a11c2aff64b5f9e910061e833aa0130556e8b53bd61c97139e1e7607784361fef20e12a1370bc89d7909574650f03b73e669e269eaaec26a6dd91e0b67a4d20b38c1b1804209bf9238392d46fa9e76f8fa8edd5665d8a38f3334a8dcd023b517a6ac7890b7e3f5ea1cd0bbcbd596e516187a57ddc4e4420425f1a6ac896620bb94a059746932a8bded5652f3ccb34267409f4cc36dd1645df2604d408562c716cab833a1b5cc0d9c75741c8ab7419380c38166ca9eb1fb2222e941abb47bd3dd3e2a30367eaa06a3130bd58b5cba12ac366bc647cb84ae16a26280b56c6665f14810b04c62ef5a7d34b5a911e8dc39a1e4684c33926487fb032f9fe56048fa51add94141f44bdb04e9337bd163827a11ee0f80adadedecfab8b6c332bc91e8b05c471af3940972eb37009543d16e139b462d1df7c80e84041718663badaf3618b448cd2e0185ae4a27242473836b8efdde6e6d24b9f9fd9f9a0c0b6901cd50791d43e23d5c5e1b6576c79c25ca46c48f5054dff7b9f336df92f566482970096f6002e76690894a3014bf5aa5db728030bb856a09e32e56e1fa7689031d0dd25c47d995916aa85894536a590f68756e8c7e5560004ad55481ab3fc6b6a2091c15e893428033ea1f3299183da233d70fb57dedaa055c26315f23160363ec07a16cc3b6ff763b1f6d194f1e4902dab85398d07422a9178d1b5bec8c85f679b664cb07e807733f08c531855ec59e90cc30940706db349824a440c3eed2628c6106a95fc9dca45f7f311b2df26a4ec71397a0d2d76071e882ba741fa89718f087fcdd69794595635a453d038e729873407c5f305084f22996086863af3715401abc3019f95dc1daa3e30d95b89f460924d2a761c27fc849f371b973ecdf04693c45b68d72f606f38280afd8ea3bb73854f3ffc9526cc20552e3a80922bab24aad8dc8f27d15bc13a2b08f1b17cd839193f6dceb253ffb7a1e278bd8fc4729331d9d0528f6f627e430cf7152670bac5d871f24804061177485ee45343fb4b7186482a465c7521347f4e42eb57619d0173e6ef1fc008a6d479f7d5f799c5ede7591df1e411415d865152990cff9174d480d37385c7eb296252a2ae81ac6fa7a1a74a97ebe374d49ee9ec7b74ca96a2f1caf0d3d05161198390d85d37dbeb7d6b53d14dfb18313c36142ffef39b8ba7fe52a39d135a5ace809fb45485ca373d2d17d922a3881a2894e049af19bdf80aa97ba2c9a4f9aa70bafc7ae9bc468eb4bd7f1e53efe7cb613c1bcdea8ca1920b0728cc78bd3ab7ace15779697c84f25e9666e7db84896707e57b39d0adc3da64e2dd9ab5c375f91cfb601325a9b2680cf40f20d0410cd629c5995739e537522017ff79cfd6a08eea01b1b006266c8af251c66f68f3777a701a0ceb603048ed5802998954e29dfc145419ed6eea54e8936ddf99ab6db91a1e505a033c0c9d29bb753e42e4d73b11450bdc9a6d4d096bfc94654232fcbaf0ee670446cb3f058792e412a3a175c684c99701ffdeadd500d5636ce1bd0f4049c4cb79616d4f1b6b1929f08c5f543e43c2b508caedc7bcfbf342659f541c94d18dbe0cf3ccaa7124204af1201a92103c63aade2455ed06e421d0bae638c541c4f067ad0d2cc9e2ea7b26f7f92b8065efeae968c30fe41512211486f5a20f52940ee185ab4aa264ae79929e2cdbe08cd98aa04601bf0ba1342e668da19b55585217c73991ed8032a6c89e423a96ec68095bc8fcb4ef78b32799b4db5be2a60500fe222abcae95ca27fe78a1056cfd1a449bc548476cf25cf31203db76187bb3f8bd4f8022df1f662c21adad4d675ec0b9d2c032d2c1ccd010bded4e0f9574469e908817d3b093bdc330d4", 0x1000}, {&(0x7f0000000940)="3603cc6736c6e99a0f3b50f8182d3ce9feebe7b848e643eb360f720248495c007d17e61e3ec24f59061408537346e27170969cca1308a2d7ec5930d07416d8251b07bd34e060bb75791919c5c895880cfd06e5da4d965a991f84a9d6ebc18db78a265b4780400b4407b46055cef845f544b2a226fe1866b6ab70bc1074b72409fd6a2014ad96da3114d9a1", 0x8b}, {&(0x7f0000000a00)="c0d064fab56d6ae9f51b7d03abdeaa09564594ffc90c1341224d330ee76447bd952a7eb8c9457695e740900abe2fc18054181d5eb1e1569c9338338728bd65607c8af565212917ff19f52fccc0d6f09d90398e74cff31e62a5cb9187722131ce7e8f7434e97e6b176cb8f81e", 0x6c}, {&(0x7f0000000a80)="671de53503319f41391efa1c1eb015f6446f4b02b173e674222619e3fc945391a2811e86fa003cd236542d3f1ea3e0e2e1f5c9ba9836367842ff5cf630d07e91b52bb9ad81dba7a7ad75efe05855c536b648d4e00bf62539272cfa7a00acfed76b36fed282d07ddc4d75086f20590c42cc7e9df7d3eb26c0e1ad5a6073cd89465b5799338775572ec9062e72a764fe75140b409ecef8df20a06385a338faecceb18652e0a05e5f4c8f3fe32262247c9890411c8759ef31ba206eec301e", 0xbd}, {&(0x7f0000000b40)="41e816906ea2b3ae3aa5cb56a22cd3b5b722636bb16c936701e6359ce101bb5b913c5c17cfefc26f18bf249663fa27639139e692e08c962caf5025fe385011636c656af77d8fb27b2007e46b20b7a5021849c4ea350154cafee7b3c4", 0x5c}], 0x7, &(0x7f0000000c40)=[{0x28, 0x0, 0x80, "75d70f982e07bbfdd17fb84fbcf41574936c40508d2f4953"}, {0x18, 0x101, 0x1, "edbdcca04a9f"}, {0xb8, 0x108, 0x8, "892acb8e427fd7ad732deb22c13b36caf8c52b135435eaba3a18631f38ac18e122a1569fcdfcb5def229e8103bb36f69c740cf28cdc72fcf52885fd0a0f387a377d8154e3a27485c03d840db16dc9ebcfec28157bd8459c67aabf6a6295f67cc38103d2648cb43e2a07071c66576a090735906a1362cc93294a1cb15f1503c12b3a18ad9c11fce8cc51a294132fa0f3ebe92281c61a056cc3c5aab65343d284241a430ba"}], 0xf8}}, {{&(0x7f0000000d40)=@isdn={0x22, 0x4, 0x7, 0xff, 0x1}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000dc0)="ef2a4f7926573167239c1757f05d361b3bed02818a3287a6d28770633848b0bee536adff35bf404971a172d7b261c0a7fc068d721e0bbebe8873f1d60ed504fbea1e2eab24ea8580a231eb539edd757a275db97f6e3ada45314a94e74f113ca438cb1d8a67ad31db30ebf60c4fb74d78cbbbc104834c688794eb146a6be76c31e43fe759f6fae27b490b77f936d5c0804bdd68ad8f5d221b", 0x98}, {&(0x7f0000000e80)="3c006cd690dd4bbad52db8569006294357f86caf987fc1d97adcbcc3409f2e0861521f20c6e96e19b9b45d3a69b43e8ac36bd14363f7a01129b6961a5feec66be6bb8cc6d633092a8c44af6e4240b52b88e9eb48579f4cbfda3572d65d27d58ca7c0463b2da2bef3f8d9b7102752c6757140ed2db73a1cfd053148ba9c188f2f7e", 0x81}, {&(0x7f0000000f40)="d3fc3ca95e13c68f9e76c249e07cf76d4721df5d10906fa5d32afe389f860286bfdf4c18f1de8376b63b18266cf615ba6f1ca1c431c36eaf70b6a485b55186913abe4386707c1fa7408c7d83c3a3de2ab27b48634c9222aa035ae83ab201652be1e40b0c4f34cda0f2faffe27db66fb39938d1fcb4f9419ae2c75b70367494de6d25d407343cd1ddfac8a56b6d5fc1a80d5ad6", 0x93}], 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="28000000000000000801000001000000c77aa2622f19aab8781e9158f1728dd28f2fb1af00e28225"], 0x28}}, {{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f00000030c0)="0bc4cb076f792677f1bd63bcf19eacc2d169659231ccace40134c809bb60222f134ab024d75dfc007e3e1a40c846fe6d26bcdcbe1517f99a10e3d959e7684086313d6ac9edbe88dff2688828ddaa59c08cd1a311bbced27a7466e56ab21cf545b135958a63848eca673d8b2e179e10ef8486bba47be4e7eb75679978ff1e6ece57adaa9a6b1bea88f5d5d20ccdfb751388a1cc", 0x93}, {&(0x7f0000003180)="11a203c67ac7fde1bb0c549c0fe92847990bd36c1ca4cdc0ed13c10c27e8717e2b5af38b2866ecd5f053ba6b9db8677d219e7fc13c13b3af0e14e90e05cade54766f17170e455d8dbb7f9b66e0d8786178941b5d1e2c404e925ec4a9e3833ca7e67c82314d6432fcc4d9debfb6ce170aa6e3c4fe6e76b000fdbf538c10a86f1c08849a0cf0a13d2e9f18986146b14d06f9653a923af14c12598edfabca71fd5239b8c4bedd494929981d8eeca64bd8cfcc57d57a9817e4aad312ca95350bda17741ff952", 0xc4}, {&(0x7f00000065c0)="c465e6876204ad3c471281e8b7a79b963b06e08d09d4e2493dba00a1c56461bbbf5f562ab2287a9874be9efb9cba60ed715f5bfc0ee8c798704c334391ee623c4c554ba75b9d08d11fd7d732a13c3c11dd5eb3799cbdef4639d808b1a6961add6c46f09a80eb7400635cafd1a9c7418c58cc050e2a873f7d98408f4def78e098690194a523cd48514fd1961657a38cc8203099a9", 0x94}, {&(0x7f0000003280)="3cc4f39b3f1eb70767f34ff78aa68def8f8bdbb31c752c4c46b0b3338d78f888cbcb04e77da6c5ca", 0x28}], 0x4, &(0x7f0000006680)=[{0x1010, 0x29, 0x2, "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"}, {0xd0, 0x107, 0x1f, "ad9a6dbca43b441eca0d39013e57b608717a780e3b48818e1110fb68e6560e13a968a59beb243dbf7315829fca78746000d76fbb639e94b3859dd4c7a6bdc0fd2cd4c6a35afa1b44d0f0a14150c0d749b836fb917fbd108fdb4c4a3bf4b9a1a938620326fa80db0b6793a383a3a3837887c0f313245eea36c807f0f4135e3113fb37569d62b27c51ee7d18c92cd2a6e731c8f214a56836631f232bd758c013557dc35dd06de3abaed4347e037f18d98c2a2de6d0f5d89271a772f620904686"}, {0x38, 0x110, 0x10001, "f734449a13360a1851ec8cc91e498e12e8f03bbbb8d4811f788d060a72b1539830f7"}, {0x60, 0x29, 0x3f5, "dea89d9fea126a3754acc1b554ee573e4a4f307d6e1203b1ba9a2a81d44d2cc1420cc9dcd566a516967ab615ee3cb60f003e7c6f85b81b452cb20ca68edbbc006a4da8a52030bd74685efb0e7972"}, {0xc0, 0x112, 0x3, "0805267abff8ffa5ebb4fd89e80188a51bd1d9f17bf49d9a66f285d90a5d5d17fb810174575c10a2ed4c7b4ea9c2b44943699e8fa5e52d75b028b4909635ea1a2a4b5de627c01d9581055b40ca385c0c32f4bd66208beb38ca28027c0ccddc57ec09c3e98f968da1e2e84c60d066f88a3a977db44609c238060facf9095d2598d00123b9450d69018d3861e78631b87fd88d36257adcb8afc96c906ad89fe4ce273e8c654f088617fe2895b74eaefe58"}], 0x1238}}, {{0x0, 0x0, &(0x7f0000007b40)=[{&(0x7f00000078c0)="6547a8e7ee5ed53ade6dce3efb5f3fbcf6d757e72f20a52bd271dad3c794bc02d49843a2e8d9e1de760c94b3f60faec25de5be52714dc61aa9258ab2f7ef816f2df4bba9e75a7c3d42672ebb5b25890873fcd98cbd881329f7296cad406b988a0539a6290cb3925a", 0x68}, {&(0x7f0000007940)="56195b808d0599034d4993edb4c602b3e6a53f33ca729341b7c4f0afa99a2405a60833432b83023c57e6748dc209b1bd8546782bf7b0bed6d1c6328a836f579db2b2cef6fcd83673bee1a3264530e07ee68a9ef4f62a3124858cd0d95727eb9d5ef568ea0e11b22d1a6ede0c04957b3532b4a00a338a81cbb90b08ceb7faab947df56c899affe487222da3bf5563419e95213814243d041b7d416f4379dbe5294db7cc82a4da5b67382e74e2471a8ee97dec56ee", 0xb4}, {&(0x7f0000007a00)="cf8b2bc933dc36eac3c66091b30590e68033dea491b5609585", 0x19}, {&(0x7f0000007a40)}, {&(0x7f0000007a80)="f516b5ab5826fe05327ada2e18d290bd0b9d5949d1", 0x15}, {&(0x7f0000007ac0)="9614ef71af13e146be4c0a092b9a17dbb1c3962f15b8c54b47457006e1193770137b6a6c0898379c06d77fbdcf4c08f9f2b4bf8c331aefcadde1ea5de5206d1e038200b582a68097fa7412aa62d0497312b6e4ff05712a9d9c73d45baf3413288a2877a42dc393973f29f998ec00845c2b617f5b", 0x74}], 0x6, &(0x7f0000007bc0)=[{0x80, 0x111, 0x3, "553cee9b4e1783c2dbe1aa0513f71ebfc79219db6027c80b8726fad5412ac42d9f51e416f874d2ca0c8a9f3a719cad4f4b627fb1cfa2c51fed67dd11d63b03167ca701fdd645dde16b143237d207dfea900d3631635771ea513072b1fbec5b0e77f9ecdb6e6cb55a5311"}], 0x80}}], 0x6, 0x8000) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(r5, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:48:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x13) 23:48:43 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:48:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40356, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:48:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1003ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2914.397540] FAT-fs (loop1): Unrecognized mount option "­çUL·å‡ 7}ÁëèêÓPéÓíxQ@ʽâõ}¶¦¢È‹µ_“*ÈÐçŽùÉþÀE[fË¢ö ¦ÆËÑ" or missing value [ 2914.400137] kauditd_printk_skb: 10 callbacks suppressed [ 2914.400156] audit: type=1326 audit(1703634523.340:5135): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2914.410004] audit: type=1326 audit(1703634523.341:5136): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2914.410252] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.415824] audit: type=1326 audit(1703634523.348:5137): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2914.423685] FAT-fs (loop6): Unrecognized mount option "fsname=" or missing value [ 2914.457854] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:48:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4035d, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2914.470943] FAT-fs (loop1): Unrecognized mount option "­çUL·å‡ 7}ÁëèêÓPéÓíxQ@ʽâõ}¶¦¢È‹µ_“*ÈÐçŽùÉþÀE[fË¢ö ¦ÆËÑ" or missing value [ 2914.480813] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2914.483569] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.485507] audit: type=1326 audit(1703634523.358:5138): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2914.487942] audit: type=1326 audit(1703634523.358:5139): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:48:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2914.501388] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.510360] EXT4-fs (loop2): mount failed [ 2914.512439] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.515365] audit: type=1326 audit(1703634523.382:5140): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2914.523828] audit: type=1326 audit(1703634523.390:5141): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2914.564782] audit: type=1326 audit(1703634523.408:5142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2914.592908] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2914.596444] audit: type=1326 audit(1703634523.408:5143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2914.598885] audit: type=1326 audit(1703634523.408:5144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35670 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:48:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="c098ea6ac800238b4519c9555c22ce22ada35c8ca87430d14e54c51719212577f29b4cd64b8caf497275a3dca2191daa4a1206cfbf4592d7402817267a38f0b6091397efb36dab7dec9ebfb8dd2287c639bb3d640e541e004b091cc793c0cb71ba7d32164aafdb89fcd4922b3ec6a3f2ea0c68dae454e45be650a85823e23d0c322204825050ecc5431324717d1600f0c4684792cf19f2fc9a025f97079a4903b227d675e91ac37363ab4b156939edc712664df59b0f9b60"]) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x1000) [ 2914.608868] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2914.613147] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2914.636495] EXT4-fs (loop2): mount failed 23:48:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x18) 23:48:43 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:48:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4035e, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2914.668836] FAT-fs (loop1): Unrecognized mount option "À˜êjÈ" or missing value 23:48:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2914.729892] FAT-fs (loop1): Unrecognized mount option "À˜êjÈ" or missing value [ 2914.743182] FAT-fs (loop4): Directory bread(block 6) failed 23:48:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1003c0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2914.760074] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.761448] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.764796] FAT-fs (loop4): Directory bread(block 6) failed [ 2914.770136] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2914.866083] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2914.869841] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2914.878509] EXT4-fs (loop2): mount failed [ 2914.910380] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2914.917825] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2914.926219] EXT4-fs (loop2): mount failed [ 2915.185834] FAT-fs (loop6): Unrecognized mount option "fsname=" or missing value 23:48:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf0) 23:48:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) r5 = accept$unix(r2, &(0x7f0000000300)=@abs, &(0x7f00000000c0)=0x6e) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8982, &(0x7f0000000280)={0x6, 'nr0\x00', {0x3}, 0x7fff}) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2928.579504] kauditd_printk_skb: 31 callbacks suppressed 23:48:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203000000000000", 0x6c, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:57 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) 23:48:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1003e5, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:48:57 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006300)={'vxcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000063c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000006380)={&(0x7f0000006340)={0x3c, r0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x20000040) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:48:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000004c0)=ANY=[@ANYBLOB="01001c7a6104de1fc1bc3ce1e3afc2d4cbbae9fc43fcc188ab5d5b4fd00aedc59d60673692cd2b6502fcfd2cab2d8d613ca4e288deba444c794f4f27b866a62161010d640410907b818d8b317fd303b5c05bcbb902c0ac11af3ae7f574e201ce1a77fcfce519602d154141906205869ce593fbf4d882e1beed506dd45892fe26550f440e6ba37947d4d853aa5fc676eb131107bb2918c614052a45a2f12c20a2dd61de4356b1622ac7005072ca6dea3d75d7fcd73687", @ANYRES32=r0, @ANYBLOB="cc"]) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x1) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x13, 0xffffffffffffffff, 0x10000000) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f00000000c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd=r7, 0x3, 0x0, 0x7, 0x4, 0x0, {0x0, r8}}, 0x4) syz_io_uring_submit(r1, 0x0, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000003c0), &(0x7f00000000c0)='./file1\x00', 0x400, 0x100, 0x0, {0x0, r8}}, 0x0) 23:48:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40365, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2928.579530] audit: type=1326 audit(1703634537.519:5176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2928.592280] audit: type=1326 audit(1703634537.521:5177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2928.602120] audit: type=1326 audit(1703634537.522:5178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2928.607335] audit: type=1326 audit(1703634537.522:5179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2928.612419] audit: type=1326 audit(1703634537.523:5180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2928.617050] audit: type=1326 audit(1703634537.544:5181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2928.622069] audit: type=1326 audit(1703634537.544:5182): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2928.630446] audit: type=1326 audit(1703634537.544:5183): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2928.645458] FAT-fs (loop4): Directory bread(block 6) failed [ 2928.649418] FAT-fs (loop4): Directory bread(block 6) failed [ 2928.650747] FAT-fs (loop4): Directory bread(block 6) failed [ 2928.652693] FAT-fs (loop4): Directory bread(block 6) failed [ 2928.655816] audit: type=1326 audit(1703634537.555:5184): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2928.661016] FAT-fs (loop1): Directory bread(block 6) failed [ 2928.682734] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2928.684209] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2928.684662] FAT-fs (loop1): Filesystem has been set read-only [ 2928.687340] EXT4-fs (loop0): get root inode failed [ 2928.689368] EXT4-fs (loop0): mount failed [ 2928.693176] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2928.695919] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2928.700601] EXT4-fs (loop2): mount failed 23:48:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40366, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:48:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x300) 23:48:57 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="274932910beaaf0511f069bbec68090557af8e3437042be8c2500cef572097d154050f67cca6e0952daffa585741e62f2a179a3bb08b2a49dcf45bf6159db7305e47f83ef97e7ec93a528d66008d585b0a92886907ad5de82edf92c2056ff34e98ed632168be413c5ccafc0900dc2bed26a7fc610eb65d1698d80b77732962ac284f6857a85a58b67f2521f4f8a5d9297e81729c8783eb74953057953caf438f35b29fb6f527ff59705f1455b777d8f82d2934b3c07736b5598777c4c3b6ddb8e5c67d7005d569c2d5d8814f1a1ec501f0ffffffffffff7ea9148b60f3ae24f15c"]) mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='vxfs\x00', 0x808000, &(0x7f0000000240)='vfat\x00') creat(&(0x7f0000000280)='./file0\x00', 0x8) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x200) [ 2928.776703] audit: type=1326 audit(1703634537.555:5185): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=35945 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2928.823167] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2928.829019] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:48:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2928.860696] EXT4-fs (loop2): mount failed [ 2928.956260] FAT-fs (loop1): Unrecognized mount option "'I2‘ ê¯ði»ìh W¯Ž47+èÂP ïW —ÑTg̦à•-¯úXWAæ/*š;°‹*IÜô[ö·0^Gø>ù~~É:Rf" or missing value [ 2928.962761] FAT-fs (loop4): Directory bread(block 6) failed [ 2928.988327] FAT-fs (loop4): Directory bread(block 6) failed 23:48:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2929.004438] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.027261] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2929.029219] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.063261] FAT-fs (loop1): Unrecognized mount option "'I2‘ ê¯ði»ìh W¯Ž47+èÂP ïW —ÑTg̦à•-¯úXWAæ/*š;°‹*IÜô[ö·0^Gø>ù~~É:Rf" or missing value 23:48:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40370, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2929.087102] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:48:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:48:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66637400020801000208008000f801319a8c587acd748fe95d1ccc9c7d610530c3266fc6c1acc65e34184a3bab5a9a5e93ff70dbc48de09fb390b2af4c95320e900dfb826a7ba40306a8f6e24d9bc1f88b66693c5dbe8a652b847d99cff00dd5984c3ccf4be9fcab168d82f1361348ff5e1415", 0x7b}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2929.122773] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:48:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x500) [ 2929.152118] EXT4-fs (loop2): mount failed [ 2929.203352] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.214736] FAT-fs (loop1): bogus number of directory entries (8) [ 2929.216076] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2929.221873] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.225833] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.232498] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2929.238391] FAT-fs (loop4): Directory bread(block 6) failed [ 2929.250398] FAT-fs (loop1): bogus number of directory entries (8) [ 2929.251799] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2929.272189] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2929.286704] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2929.305472] EXT4-fs (loop2): mount failed 23:49:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:49:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:49:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) setfsuid(0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5606) r3 = getpid() process_vm_readv(r3, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:49:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000500), 0x101004, 0x0) openat(r1, &(0x7f0000000540)='./file1\x00', 0x40000, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x110, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="006e7e562d87854dbf680010a12654da799894a73e9c5e77d3491633acbaba1a2b62f05cc84e3a651e608631a882aa168246d05acbcf726a48b424a75ed1fbedf67dc71fdd6ec6c5d14eceedb7509c0d45e08c0e9099458f21d0e44d0c517f577208da3a1dda10f12d037036735c5a90f5829a71d4ced8aa65a89c7ce553925129535abe4ae2b10fd8c7c4f67117ce34cd88519e32997a53858e53000000"]) process_vm_readv(0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r3 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x274202, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) r8 = mmap$IORING_OFF_SQES(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x3800000, 0x40010, 0xffffffffffffffff, 0x10000000) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000280), &(0x7f0000000300)='./file1\x00', 0x8, 0x3) splice(r0, &(0x7f0000000480)=0x3, r3, &(0x7f00000004c0)=0x1, 0x80000000, 0x1) syz_io_uring_submit(r2, r8, &(0x7f00000000c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x331954a8d8388dd8}, 0x5372) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000340)) 23:49:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x600) 23:49:12 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x5) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:49:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100500, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:49:12 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe96222f249fd6250482cf266ba911bc809ca93d323d7bb6c500aaa9358657a75563fd99931730bc474c913c5cf9482f17720b6d55fe455598d4a854cfe5046232d40edc1466ac77ed90ecc512a7cf12bc8e3acf39e1608eaed28183bf425bd5ce54e4bb0cb8bf8e8bb83e993ccfa81f878b713fa2ac95a49835f8400cb7a66202420e4b9d1449ea32fd92fae85af5994984628aa880dbf19662597151b032cc0cb6cbc13757d0c6e17839e73461149e8abc5c8b00ded9977dabbcde85c4ff01b434d9ef92f0ce093a895ddbb3f970f6c"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2943.660964] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2943.676791] kauditd_printk_skb: 10 callbacks suppressed [ 2943.676810] audit: type=1326 audit(1703634552.616:5196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2943.685229] FAT-fs (loop4): Directory bread(block 6) failed [ 2943.688763] audit: type=1326 audit(1703634552.618:5197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2943.699284] audit: type=1326 audit(1703634552.620:5198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2943.711223] audit: type=1326 audit(1703634552.621:5199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2943.719725] FAT-fs (loop4): Directory bread(block 6) failed [ 2943.723323] FAT-fs (loop4): Directory bread(block 6) failed [ 2943.723853] FAT-fs (loop1): bogus number of reserved sectors [ 2943.725776] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2943.739765] audit: type=1326 audit(1703634552.630:5200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2943.740412] FAT-fs (loop4): Directory bread(block 6) failed [ 2943.759507] audit: type=1326 audit(1703634552.631:5201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2943.769614] FAT-fs (loop1): bogus number of reserved sectors [ 2943.770986] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2943.772998] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2943.776698] audit: type=1326 audit(1703634552.641:5202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2943.796013] audit: type=1326 audit(1703634552.641:5203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:49:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2943.808703] audit: type=1326 audit(1703634552.641:5204): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2943.814116] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2943.820787] audit: type=1326 audit(1703634552.643:5205): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36133 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:49:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x262401, &(0x7f00000000c0)={[], [{@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2943.848201] EXT4-fs (loop2): mount failed 23:49:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:49:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x700) [ 2943.930305] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2943.935100] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2943.950123] EXT4-fs (loop2): mount failed [ 2943.984033] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2944.000505] EXT4-fs (loop0): get root inode failed [ 2944.001620] EXT4-fs (loop0): mount failed [ 2944.015123] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.020339] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.024212] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.028503] FAT-fs (loop4): Directory bread(block 6) failed 23:49:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1005ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:49:13 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x90000, &(0x7f0000000180)=ANY=[]) openat(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x4000, 0x80) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:49:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xe00) 23:49:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2944.141404] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2944.152726] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:49:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2944.170720] EXT4-fs (loop2): mount failed 23:49:13 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2944.195439] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.205877] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.207242] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.209315] FAT-fs (loop4): Directory bread(block 6) failed [ 2944.219698] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2944.223246] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2944.228620] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2944.230341] EXT4-fs (loop2): mount failed 23:49:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:49:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100600, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:49:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf00) 23:49:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cca00"]) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)=@v3={0x3000000, [{0x81, 0x1}, {0x2, 0x7}], 0xffffffffffffffff}, 0x18, 0x1) 23:49:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:49:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000418000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="09000000000000002b2f66696c653100cf1e12aa76ec1d4b634292dd1df58e8b0f3dc67a50a4012d89a3c333eb0d137318fff0e9946752cd8994a2f17c46bd2c52c75fbaa9ff58b5c563bc702225bb1beb632da25862945d9e7f1e1db590400e60395e97c39380044d1a65b2e2ca55b65bd2c5e6668c3aa1b64408"]) openat$cgroup_freezer_state(r3, &(0x7f0000000280), 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000300)={0x80, 0x40, 0x45000, 0x4, 0x7fff}) sendfile(r2, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x4000}, 0xe) 23:49:28 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:49:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESHEX=r2, @ANYRES16]) r3 = getpid() process_vm_readv(r3, &(0x7f0000000240)=[{&(0x7f00000008c0)=""/206, 0xce}], 0x1, &(0x7f0000000140), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r6, 0xc400941d, &(0x7f00000003c0)={0x0, 0x6, 0x3f, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2959.498061] kauditd_printk_skb: 28 callbacks suppressed [ 2959.498080] audit: type=1326 audit(1703634568.438:5234): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2959.507002] audit: type=1326 audit(1703634568.438:5235): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:49:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2959.529027] audit: type=1326 audit(1703634568.438:5236): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2959.534017] audit: type=1326 audit(1703634568.440:5237): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2959.540419] audit: type=1326 audit(1703634568.440:5238): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 23:49:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='blkio.reset_stats\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x3a, 0x1, 0x7, 0x2, 0x3, 0x0, 0x9, 0x22f, 0x40, 0x3c5, 0x8, 0x7, 0x38, 0x1, 0x80, 0x1, 0x8}, [{0x3, 0x1, 0xfffffffffffff801, 0x81, 0x9783, 0x1, 0x100000000, 0x1}, {0x70000000, 0x7f, 0x9, 0x5, 0x3, 0x4, 0x2, 0x4}], "f7c5622e9607c7447c889501a33070bd971d1328554da5b229576c673abcd39dabcd722cc160a18a8252d05d2cf490a7defe79f09a73f7a0964e2e5fcd0eb62ac1b9d6139229d1555b112a8faf7d24addd774db3bdff31e1eaac9f8f70ceac6436fec5b4b621af37c5bfcf7415b1ce79151abbe77c7d45cae241a56477faca2c0b6f390160c8bf233c0c62c344740ccb990e8cb8bb79848b99a0dd2525bf3a3c3bef230597c41a43b6dc19a4bfa3980daa12a2e8a79aa846e59e41059725db9f1b81b319a37c2443aee5dd6ba370ad3ad9ad369227ba94b8564be413c195f36a", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x890) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/12, 0xc}, {&(0x7f0000000c80)=""/189, 0xbd}, {&(0x7f0000000300)=""/28, 0x1c}], 0x3) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 2959.548137] audit: type=1326 audit(1703634568.440:5239): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2959.557428] audit: type=1326 audit(1703634568.440:5240): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2959.562058] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2959.564883] audit: type=1326 audit(1703634568.447:5241): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2959.569654] audit: type=1326 audit(1703634568.447:5242): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2959.574201] audit: type=1326 audit(1703634568.457:5243): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36412 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2959.588008] FAT-fs (loop1): Unrecognized mount option "ŒÊ" or missing value [ 2959.611947] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.632036] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2959.634875] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2959.640569] EXT4-fs (loop2): mount failed [ 2959.654681] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.672472] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.678797] FAT-fs (loop1): Unrecognized mount option "ŒÊ" or missing value [ 2959.683501] FAT-fs (loop4): Directory bread(block 6) failed 23:49:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:49:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x1300) [ 2959.783387] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2959.948288] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.967254] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.976662] FAT-fs (loop4): Directory bread(block 6) failed [ 2959.978500] FAT-fs (loop4): Directory bread(block 6) failed 23:49:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1006ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:49:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000000280)='./file1\x00', 0x40000000004) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000800000052ad8034c8111258ab0629f68e9083adc5b131f15a7f", @ANYRES32=r0, @ANYBLOB='H']) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x400080, 0x0) fcntl$setstatus(r1, 0x4, 0x400) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:49:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0008a4280de77459961f0800009307ad35fd3dd84c883a41b6d1c0ce413f106f157af8b57b68138bcce2009150a72f1f1a652a8ee121e4fc26fb2c5ffec7ea311e34"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) uselib(&(0x7f0000000040)='./file1\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:49:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:49:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x1800) 23:49:44 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:49:44 executing program 1: ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000180)=0x81) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f00000001c0)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[@ANYBLOB='\x00']) creat(&(0x7f00000000c0)='./file0\x00', 0x40) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:49:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2975.402931] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.420163] kauditd_printk_skb: 9 callbacks suppressed [ 2975.420182] audit: type=1326 audit(1703634584.360:5253): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2975.426419] FAT-fs (loop1): Directory bread(block 6) failed [ 2975.428364] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.429543] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.432464] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.435622] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2975.436930] FAT-fs (loop1): Filesystem has been set read-only [ 2975.439078] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 2975.442677] audit: type=1326 audit(1703634584.379:5254): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2975.458392] audit: type=1326 audit(1703634584.382:5255): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2975.462445] audit: type=1326 audit(1703634584.382:5256): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2975.466539] audit: type=1326 audit(1703634584.392:5257): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2975.470768] audit: type=1326 audit(1703634584.392:5258): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2975.486892] audit: type=1326 audit(1703634584.392:5259): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:49:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf000) [ 2975.496939] audit: type=1326 audit(1703634584.392:5260): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2975.501946] audit: type=1326 audit(1703634584.393:5261): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2975.509965] audit: type=1326 audit(1703634584.393:5262): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36570 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2975.529847] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2975.552211] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.560987] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2975.564481] EXT4-fs (loop2): mount failed 23:49:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2975.608219] FAT-fs (loop4): Directory bread(block 6) failed 23:49:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2975.634634] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.636307] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.637597] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.653257] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.655204] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2975.657884] EXT4-fs (loop2): mount failed [ 2975.670661] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) 23:49:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x80000) 23:49:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100700, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:49:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:49:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:49:44 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2975.778342] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.781471] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.783087] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2975.785965] EXT4-fs (loop2): mount failed [ 2975.793932] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.802846] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.806500] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2975.812175] FAT-fs (loop4): Directory bread(block 6) failed [ 2975.818578] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.820415] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2975.823032] EXT4-fs (loop2): mount failed 23:49:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1007ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 2975.910848] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.926804] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2975.947289] EXT4-fs (loop2): mount failed [ 2975.991117] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2975.998965] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2976.012709] EXT4-fs (loop2): mount failed 23:50:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) io_uring_enter(r0, 0x95a, 0xd3cc, 0x3, &(0x7f00000000c0)={[0x7f]}, 0x8) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) readlinkat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', &(0x7f00000003c0)=""/95, 0x5f) write(r0, &(0x7f0000000300)="6a7da810fafe09d52626521e2ccfa8d0736c55f4643bed458efbeef0fc1420347990eb89880c6cdebe075cd06339ddbf3ba99d0fed2fe72128239c3378f30ffb0b3a86cd620196e119783f7b1175ee875997d8decc865bfc659d44ed55ee0de4bf53a1b4f5843f82f62f0384032b", 0x6e) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xe0000) 23:50:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d242010012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:50:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1007fc, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:00 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:50:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[@ANYBLOB="9e"]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058140)={0x8000000000000000, [], 0x6, "c30889091c7f67"}) sendfile(r4, r6, 0x0, 0x80000001) mknodat$loop(r6, &(0x7f00000001c0)='./file0/file0\x00', 0x4, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x100000001) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r8, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r3}}, './file0\x00'}) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:50:00 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000300)='./file1\x00', 0x3, 0x1, &(0x7f0000000340)=[{&(0x7f00000003c0)="fcf0c95f7346515c37e267b72ab35c595edb4fe3825ee69ea766ebcbce0d8daf312f2a74cb39cb5e18e9278da41e228ff44652e10a641db64867c5cd397f5e57c084f23dd8c6f73539ab0a5f71624e0e83e30fabdf4cd38c971f9e09c8ddd9a2bb32c2103511916005ee1af3dac13e6afef95a0fafaac3b1ad1b8c6f8cb3e690a5cd98eff44917d37932bb7a2610acc8bf91741d5354a1f3de954a85c40d758179d1a1c966fe9c93707b3da97b7193e2b564379c927688f5df", 0xb9, 0x7ff}], 0x1001, &(0x7f0000000480)={[{@utf8no}, {@shortname_win95}, {@numtail}, {@nonumtail}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'utf8'}}], [{@audit}, {@dont_appraise}, {@obj_user={'obj_user', 0x3d, '\xaa\xaa\xaa\xaa\xaa'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-(&![-/*w}:]'}}]}) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r1, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000309d008018000000", @ANYRES32=r1, @ANYBLOB='\x00']) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r3 = openat$cgroup_devices(r1, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r7 = openat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r6, r8, 0x0, 0x80000001) sendfile(r3, r8, &(0x7f00000000c0), 0x11bb) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r9, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 2991.350015] FAT-fs (loop1): Unrecognized mount option "ž" or missing value [ 2991.354488] FAT-fs (loop4): Directory bread(block 6) failed [ 2991.358485] kauditd_printk_skb: 33 callbacks suppressed [ 2991.358507] audit: type=1326 audit(1703634600.298:5296): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2991.364312] audit: type=1326 audit(1703634600.299:5297): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2991.376619] audit: type=1326 audit(1703634600.299:5298): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2991.385436] FAT-fs (loop4): Directory bread(block 6) failed [ 2991.386915] FAT-fs (loop4): Directory bread(block 6) failed [ 2991.388792] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2991.391342] FAT-fs (loop4): Directory bread(block 6) failed [ 2991.401223] audit: type=1326 audit(1703634600.341:5299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 2991.416174] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2991.421070] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2991.437480] audit: type=1326 audit(1703634600.371:5300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 2991.440065] EXT4-fs (loop2): mount failed [ 2991.468707] audit: type=1326 audit(1703634600.371:5301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d242010012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2991.498613] audit: type=1326 audit(1703634600.371:5302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2991.504193] audit: type=1326 audit(1703634600.372:5303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2991.509782] audit: type=1326 audit(1703634600.372:5304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 2991.512755] audit: type=1326 audit(1703634600.372:5305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=36849 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf0ffff) [ 2991.581649] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2991.587867] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2991.601967] EXT4-fs (loop2): mount failed 23:50:00 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 2991.639611] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) 23:50:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file0\x00', 0x40000, 0x4) openat(r4, &(0x7f0000000280)='./file1\x00', 0x4722c0, 0x52) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d242010012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) 23:50:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1008ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x1000000) 23:50:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6810000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 2991.884871] EXT4-fs (loop0): fragment/cluster size (32768) != block size (2048) [ 2991.926746] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2991.952103] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2991.979956] EXT4-fs (loop2): mount failed [ 2992.008027] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.035447] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.047220] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.057259] FAT-fs (loop4): Directory bread(block 6) failed 23:50:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2992.183448] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 23:50:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100900, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x2000000) 23:50:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2992.341868] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.346420] FAT-fs (loop1): Unrecognized mount option "ž" or missing value [ 2992.348341] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.349615] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.351813] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.361632] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2992.376822] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2992.395353] EXT4-fs (loop2): mount failed [ 2992.401200] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 23:50:01 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:50:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x810, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000300)=ANY=[@ANYBLOB="0000041800000000000000009d0f345ba2117fcd7157f9cf88e10fa7802da03b1ed6090000000d17b59f0898dfed56a18b1bed9ecc9c24b154c27430eafb444411794dbb5a252dc3f98b4cfc292c7cb57eb5c64e63faa709abe6788707ecd457263d3e5cfd669de25078ebad6490b649049b321a20681a80e5", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x234000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x3000000) 23:50:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="dcc1c860f9ecddea4afa15ea3801"]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000300)={'veth0_to_bridge\x00'}) faccessat2(r0, &(0x7f0000000240)='./file0\x00', 0x8, 0x1300) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 2992.497625] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 2992.500750] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 2992.505364] EXT4-fs (loop2): mount failed 23:50:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) [ 2992.561368] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.571884] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.579643] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.582665] FAT-fs (loop1): Unrecognized mount option "ÜÁÈ`ùìÝêJúê8" or missing value [ 2992.590051] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 2992.597039] FAT-fs (loop4): Directory bread(block 6) failed [ 2992.867384] FAT-fs (loop1): Unrecognized mount option "ÜÁÈ`ùìÝêJúê8" or missing value 23:50:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000240)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@permit_directio}, {@euid_gt={'euid>', 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@seclabel}]}) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) ioctl$sock_bt_hci(r1, 0x400448cb, &(0x7f0000000300)="452ee457c5fbdff5ce943b372c64162254df73397dfff715736db776595eb2b628fb3dee657a9c22637ce9682da68c88da05d98d6e468e83cb12673ab4cdf47ddde28a572f5ec160334113ab51f7065f2b9ddf154bb191c67c40d97aad6a88b02da3ff006cf2dc34e705d4ded3222613d7873fea60bb11b784afdce5ba31c99f21cb6bfce4f7aadaca9933fda88ea7d9cb05979b4dc1fe9541d7dce7a628c82d3274000000") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) faccessat2(r0, &(0x7f00000000c0)='./file0\x00', 0x145, 0x1200) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:50:16 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="220672e4251f313916000016", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) accept$unix(r4, &(0x7f0000000300)=@abs, &(0x7f0000000280)=0x6e) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x101}, 0xe) 23:50:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1009ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) r2 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r2}}, './file1\x00'}) openat$cgroup_type(r3, &(0x7f0000000280), 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, 0x0) 23:50:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x4000000) 23:50:16 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 3007.825936] FAT-fs (loop1): Unrecognized mount option "smackfsfloor=vfat" or missing value [ 3007.831279] kauditd_printk_skb: 51 callbacks suppressed [ 3007.831298] audit: type=1326 audit(1703634616.771:5357): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3007.839855] FAT-fs (loop4): Directory bread(block 6) failed [ 3007.842313] audit: type=1326 audit(1703634616.782:5358): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3007.864228] audit: type=1326 audit(1703634616.801:5359): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3007.868855] audit: type=1326 audit(1703634616.804:5360): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3007.874009] FAT-fs (loop4): Directory bread(block 6) failed [ 3007.875087] FAT-fs (loop4): Directory bread(block 6) failed [ 3007.877787] FAT-fs (loop4): Directory bread(block 6) failed [ 3007.878354] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3007.879347] audit: type=1326 audit(1703634616.804:5361): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3007.880187] audit: type=1326 audit(1703634616.804:5362): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3007.895726] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:50:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, 0x0) 23:50:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3007.937157] EXT4-fs (loop2): mount failed [ 3007.958408] audit: type=1326 audit(1703634616.804:5363): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x5000000) [ 3008.027401] audit: type=1326 audit(1703634616.804:5364): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3008.040142] audit: type=1326 audit(1703634616.804:5365): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3008.060073] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3008.062242] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3008.064995] EXT4-fs (loop2): mount failed [ 3008.068112] audit: type=1326 audit(1703634616.804:5366): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37280 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, 0x0) 23:50:17 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:50:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100a00, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x6000000) [ 3008.219779] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3008.221159] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3008.223587] EXT4-fs (loop2): mount failed [ 3008.265207] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3008.266663] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3008.269082] EXT4-fs (loop2): mount failed [ 3008.411462] FAT-fs (loop1): Unrecognized mount option "smackfsfloor=vfat" or missing value 23:50:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100aba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17, 0x40000000000}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:50:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x7000000) 23:50:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:31 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:50:31 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r5, r7, 0x0, 0x80000001) pread64(r5, &(0x7f0000000080)=""/49, 0x31, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3022.318436] kauditd_printk_skb: 31 callbacks suppressed [ 3022.318452] audit: type=1326 audit(1703634631.258:5398): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3022.331416] audit: type=1326 audit(1703634631.258:5399): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:50:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00b1752f79a6c76d59fadfedbcc49d797689414838038bb497fbf468432b050000297c605f40b8e34a99738aa1422da70b441685dfa04efee8f74270c3876aa2da9a1114d8ee28fe9bdf864a6d1c243f4c743eb440ee2dde43c854f1ab87dd7f7c7e2c4833a71e6a51658e156674969b24aec3e929a378acd0a15d890ff69a8d6cb9fca42b7e9291179c353576ed4d9064918391a0ef2f716cb5bfb2b8bb7d21dab3fdf639a4f7d3554bf5df22de103d990c5d216b24"]) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0xfffffffd) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3022.348141] audit: type=1326 audit(1703634631.259:5400): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3022.358361] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3022.360284] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3022.370656] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.373118] FAT-fs (loop1): bogus number of reserved sectors [ 3022.374650] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3022.383023] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.384682] audit: type=1326 audit(1703634631.264:5401): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3022.387792] EXT4-fs (loop2): mount failed [ 3022.391656] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.400116] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.404865] audit: type=1326 audit(1703634631.264:5402): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3022.417276] audit: type=1326 audit(1703634631.264:5403): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3022.438611] FAT-fs (loop1): bogus number of reserved sectors [ 3022.439960] FAT-fs (loop1): Can't find a valid FAT filesystem 23:50:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3022.445934] audit: type=1326 audit(1703634631.265:5404): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf000000) [ 3022.461629] audit: type=1326 audit(1703634631.268:5405): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3022.491678] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3022.497443] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3022.501059] audit: type=1326 audit(1703634631.272:5406): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3022.508783] EXT4-fs (loop2): mount failed 23:50:31 executing program 1: r0 = socket$inet_icmp(0x2, 0x2, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000400)={0x10002005}) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="008d238108a880c06f78babf4920d0ac1c0900000000000000ce9c8721e7a7a5faded7f63ec40c85d4f6092b952f"]) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/schedstat\x00', 0x0, 0x0) pread64(r2, &(0x7f0000000040)=""/4126, 0x101e, 0xa4) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="10000ed90b310007002edbda696c6531"], 0x10) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000180)='?-\x95+%\b^\x00', &(0x7f00000001c0)='*\x00', &(0x7f0000000240)='[/:\x00', &(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)=')\x00', &(0x7f0000000300)='\n'], &(0x7f00000004c0)=[&(0x7f0000000380)='\\\x06[@^\\\x00', &(0x7f00000003c0)='#\x00', &(0x7f00000015c0)='\xc2\xb39\x7fC\xcf$\x86\xeb[\x7fvI\xcd\x1f\xc0\x9dt\x0f\xe0Bel]\x0e\x05,\xdb.\xc6s\x86\xf6W\xf8WO\xed\a\xa1\x84TWX\xe9\x06\x06\x89\xf2\xa2\xe3\x16\x00\xabQi\x13\"\xb1\x01\x9be\x9a\xf3\xa9\x8f\x98\xd1QI\xe8\xb9\x84\xad\xdb\xad\x00\xafEw\x16Ug\xfdh\xdb\xe2\xee7J\x14\\(\xa3\x1d\x91e\xed\xfb\x98\xd9X\xc6\v|d\xa6\xd4\xdd\xaf\xc8n\xda\x92E&C-\xd7r\xd0\x00\x00\x00\x00', &(0x7f0000000440)='vfat\x00', &(0x7f0000000480)='%)\x00'], 0x400) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x20082, 0x81) sendfile(r3, r5, 0x0, 0x80000001) mknodat$null(r3, &(0x7f0000000500)='./file0\x00', 0x200, 0x103) getdents64(r4, &(0x7f00000005c0)=""/4096, 0x1000) [ 3022.549581] audit: type=1326 audit(1703634631.273:5407): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37542 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3022.559467] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.594612] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.595309] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.596222] FAT-fs (loop4): Directory bread(block 6) failed [ 3022.617056] FAT-fs (loop1): Directory bread(block 6) failed [ 3022.653092] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3022.655270] FAT-fs (loop1): Filesystem has been set read-only [ 3022.952972] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:50:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r5, 0x5, 0x955, 0x0, 0x80000000}) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100b00, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:50:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r5 = dup(r0) openat(r5, &(0x7f00000000c0)='./file1\x00', 0x200, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB='y\x00'/12, @ANYRES32=r0, @ANYBLOB='\x00']) process_vm_readv(0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000e00)=[{&(0x7f00000007c0)=""/127, 0x7f}, {&(0x7f0000000840)=""/202, 0xca}, {&(0x7f0000000940)=""/172, 0xac}, {&(0x7f0000000a00)=""/75, 0x4b}, {&(0x7f0000000a80)=""/195, 0xc3}, {&(0x7f0000000b80)=""/7, 0x7}, {&(0x7f0000000bc0)=""/246, 0xf6}, {&(0x7f0000000cc0)=""/218, 0xda}, {&(0x7f0000000dc0)}], 0x9, &(0x7f00000031c0)=[{&(0x7f0000000ec0)=""/78, 0x4e}, {&(0x7f0000000f40)=""/245, 0xf5}, {&(0x7f0000002080)=""/67, 0x43}, {&(0x7f0000002100)=""/157, 0x9d}, {&(0x7f00000021c0)=""/4096, 0x1000}], 0x5, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) process_vm_readv(0x0, &(0x7f0000000600)=[{&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f00000003c0)=""/74, 0x4a}, {&(0x7f0000000440)=""/68, 0x44}, {&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000580)=""/91, 0x5b}, {&(0x7f0000001080)=""/4096, 0x1000}], 0x6, &(0x7f0000000280)=[{&(0x7f0000000680)=""/66, 0x42}, {&(0x7f0000000700)=""/67, 0x43}, {&(0x7f00000000c0)=""/51, 0x33}], 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(r5, &(0x7f0000000780)='./file1\x00', 0x40000, 0x80) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:50:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:50:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x13000000) 23:50:45 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:50:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e6661bbe81ca18841bdce008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 3036.572207] kauditd_printk_skb: 9 callbacks suppressed [ 3036.572227] audit: type=1326 audit(1703634645.512:5417): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3036.585921] audit: type=1326 audit(1703634645.512:5418): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3036.603706] audit: type=1326 audit(1703634645.512:5419): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3036.621974] FAT-fs (loop4): Directory bread(block 6) failed [ 3036.640511] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3036.641205] FAT-fs (loop4): Directory bread(block 6) failed [ 3036.649344] FAT-fs (loop1): bogus logical sector size 7400 [ 3036.650103] FAT-fs (loop4): Directory bread(block 6) failed [ 3036.650897] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3036.652589] audit: type=1326 audit(1703634645.513:5420): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3036.660409] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3036.668660] EXT4-fs (loop2): mount failed [ 3036.672286] FAT-fs (loop4): Directory bread(block 6) failed [ 3036.690504] audit: type=1326 audit(1703634645.513:5421): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3036.701636] audit: type=1326 audit(1703634645.515:5422): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:50:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3036.732966] FAT-fs (loop1): bogus logical sector size 7400 [ 3036.734388] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3036.775847] audit: type=1326 audit(1703634645.521:5423): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3036.821003] audit: type=1326 audit(1703634645.521:5424): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:50:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd020000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3036.879742] audit: type=1326 audit(1703634645.521:5425): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3036.889433] audit: type=1326 audit(1703634645.521:5426): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37703 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:51:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) prlimit64(r1, 0xb, &(0x7f00000000c0)={0xfffffffffffffff9, 0x954}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:51:01 executing program 1: r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) renameat(r0, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0/file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0xe14b, 0x0) 23:51:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100bba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:51:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xd050000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:51:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x18000000) 23:51:01 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:51:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x19300000) 23:51:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x30, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = getpgid(0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x8, 0x0, 0x0, @pid=r4}]}, 0x24}}, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x300, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x1f, 0x9, 0xfd, 0x3, 0x0, 0x6, 0x15089, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x6}, 0x80, 0x1, 0x6, 0x0, 0x4, 0x3, 0x7, 0x0, 0x3ff, 0x0, 0xcd200000000}, r4, 0x10, r5, 0x8) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001080)=""/4096, 0x1000, 0x401) connect$bt_l2cap(r8, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3052.832941] kauditd_printk_skb: 11 callbacks suppressed [ 3052.832960] audit: type=1326 audit(1703634661.772:5438): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3052.843355] audit: type=1326 audit(1703634661.773:5439): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3052.853629] FAT-fs (loop0): Directory bread(block 6) failed [ 3052.868834] audit: type=1326 audit(1703634661.780:5440): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3052.875659] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3052.877527] FAT-fs (loop0): Filesystem has been set read-only [ 3052.879879] FAT-fs (loop4): Directory bread(block 6) failed [ 3052.883000] FAT-fs (loop4): Directory bread(block 6) failed [ 3052.893402] FAT-fs (loop4): Directory bread(block 6) failed [ 3052.907721] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3052.912681] FAT-fs (loop4): Directory bread(block 6) failed [ 3052.924293] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:51:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3e5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3052.964011] EXT4-fs (loop2): mount failed [ 3052.965160] audit: type=1326 audit(1703634661.781:5441): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:51:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xe5ffffff) [ 3052.997778] audit: type=1326 audit(1703634661.781:5442): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:51:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3053.017335] audit: type=1326 audit(1703634661.796:5443): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3053.035354] FAT-fs (loop0): Directory bread(block 6) failed [ 3053.053245] audit: type=1326 audit(1703634661.802:5444): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3053.058418] audit: type=1326 audit(1703634661.802:5445): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3053.063867] audit: type=1326 audit(1703634661.814:5446): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3053.068680] audit: type=1326 audit(1703634661.823:5447): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=37846 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:51:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100c00, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 3053.122686] FAT-fs (loop4): Directory bread(block 6) failed [ 3053.133233] FAT-fs (loop4): Directory bread(block 6) failed [ 3053.146229] FAT-fs (loop4): Directory bread(block 6) failed 23:51:02 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 3053.170451] FAT-fs (loop4): Directory bread(block 6) failed 23:51:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 1) 23:51:02 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:51:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf6ffffff) [ 3053.308760] FAULT_INJECTION: forcing a failure. [ 3053.308760] name failslab, interval 1, probability 0, space 0, times 0 [ 3053.311285] CPU: 0 PID: 37981 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3053.312702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3053.314389] Call Trace: [ 3053.314927] dump_stack+0x107/0x167 [ 3053.315679] should_fail.cold+0x5/0xa [ 3053.316458] ? __do_sys_memfd_create+0xfb/0x450 [ 3053.317407] should_failslab+0x5/0x20 [ 3053.318195] __kmalloc+0x72/0x390 [ 3053.318903] __do_sys_memfd_create+0xfb/0x450 [ 3053.319827] ? ksys_write+0x1a9/0x260 [ 3053.320598] ? memfd_file_seals_ptr+0x170/0x170 [ 3053.321548] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3053.322607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3053.323663] do_syscall_64+0x33/0x40 [ 3053.324420] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3053.325453] RIP: 0033:0x7f62fcff4b19 [ 3053.326206] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3053.329936] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3053.331508] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3053.332950] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3053.334392] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3053.335841] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3053.337288] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 23:51:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) umount2(&(0x7f00000000c0)='./file1\x00', 0x2) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) connect$bt_l2cap(r5, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x5) 23:51:19 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe962"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:51:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) symlinkat(&(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000280)='./file1\x00') openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3070.166754] FAULT_INJECTION: forcing a failure. [ 3070.166754] name failslab, interval 1, probability 0, space 0, times 0 [ 3070.169162] CPU: 1 PID: 38102 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3070.170580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3070.172270] Call Trace: [ 3070.172811] dump_stack+0x107/0x167 [ 3070.173552] should_fail.cold+0x5/0xa [ 3070.174325] ? create_object.isra.0+0x3a/0xa20 [ 3070.175290] should_failslab+0x5/0x20 [ 3070.176059] kmem_cache_alloc+0x5b/0x310 [ 3070.176909] create_object.isra.0+0x3a/0xa20 [ 3070.177802] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3070.178823] __kmalloc+0x16e/0x390 [ 3070.179560] __do_sys_memfd_create+0xfb/0x450 [ 3070.180463] ? ksys_write+0x1a9/0x260 [ 3070.181235] ? memfd_file_seals_ptr+0x170/0x170 [ 3070.182177] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3070.183246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3070.184294] do_syscall_64+0x33/0x40 23:51:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x80000001) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001680), 0x1, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000001780)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x24, 0x4, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) fsopen(&(0x7f0000001640)='ocfs2_dlmfs\x00', 0x1) fsopen(&(0x7f00000017c0)='ext2\x00', 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000001240)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000000c0)={r4, 0x0, 0x20}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRES32=r4, @ANYRESHEX=r2]) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000240)={{}, 0x0, 0x12, @inherit={0x58, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000080000200000000000000ce0b0000000000000800000000000000220000000000000002000000000000001b0e0000000000000700000000000000ff070000000000000700000000000000ff00000000000000"]}, @devid=r4}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x80000001) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="642df85f"]) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:51:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100cba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:51:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:51:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 2) 23:51:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xfffff000) [ 3070.185168] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3070.186286] RIP: 0033:0x7f62fcff4b19 [ 3070.187044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3070.190719] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3070.192267] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3070.193716] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3070.195185] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3070.196724] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3070.198310] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3070.209019] kauditd_printk_skb: 70 callbacks suppressed [ 3070.209038] audit: type=1326 audit(1703634679.149:5518): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.209155] audit: type=1326 audit(1703634679.149:5519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.209769] audit: type=1326 audit(1703634679.149:5520): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.210444] audit: type=1326 audit(1703634679.150:5521): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.211702] audit: type=1326 audit(1703634679.150:5522): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.216982] audit: type=1326 audit(1703634679.155:5523): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3070.218966] audit: type=1326 audit(1703634679.157:5524): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3070.219061] audit: type=1326 audit(1703634679.157:5525): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3070.219151] audit: type=1326 audit(1703634679.158:5526): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3070.223276] audit: type=1326 audit(1703634679.159:5527): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38098 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3070.236861] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.285861] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.285977] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.295587] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.303316] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3070.303643] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3070.315254] EXT4-fs (loop2): mount failed [ 3070.337124] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3070.340219] EXT4-fs (loop0): get root inode failed [ 3070.381007] EXT4-fs (loop0): mount failed [ 3070.415272] FAT-fs (loop1): Unrecognized mount option "d-ø_" or missing value [ 3070.421800] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 23:51:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x12010000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3070.425481] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3070.469384] EXT4-fs (loop2): mount failed 23:51:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xffffffe5) 23:51:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x15300000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:51:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 3) 23:51:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100d00, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 3070.687623] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.698243] FAULT_INJECTION: forcing a failure. [ 3070.698243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3070.700784] CPU: 0 PID: 38200 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3070.702224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3070.703907] Call Trace: [ 3070.704453] dump_stack+0x107/0x167 [ 3070.705200] should_fail.cold+0x5/0xa [ 3070.705994] _copy_from_user+0x2e/0x1b0 [ 3070.706801] __do_sys_memfd_create+0x16d/0x450 [ 3070.707766] ? memfd_file_seals_ptr+0x170/0x170 [ 3070.708722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3070.709798] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3070.710858] do_syscall_64+0x33/0x40 [ 3070.711633] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3070.712668] RIP: 0033:0x7f62fcff4b19 [ 3070.713423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3070.717142] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3070.718668] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3070.720113] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3070.721549] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3070.722976] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3070.724415] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3070.739375] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.741407] FAT-fs (loop4): Directory bread(block 6) failed [ 3070.750941] FAT-fs (loop4): Directory bread(block 6) failed 23:51:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r0, r2, 0x0, 0x80000001) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f00000000c0)) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) statx(r1, &(0x7f0000000240)='./file0/file0\x00', 0x6000, 0x8, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f00000001c0)='./file1\x00', 0x0, r4, 0x800) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) [ 3070.797351] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3070.812656] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:51:19 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="01ea793bc07f000000000000", @ANYRES32=r0, @ANYBLOB='\x00']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) r3 = getpid() process_vm_readv(r3, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3070.843868] EXT4-fs (loop2): mount failed 23:51:19 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe962"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 3070.925746] FAT-fs (loop1): Unrecognized mount option "ÙSœ{¨syó=ígÉoñ»l8«Bìíµ‚ÂÛLûäˆ)" or missing value [ 3070.938291] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3070.952930] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3070.964212] EXT4-fs (loop2): mount failed [ 3071.266942] FAT-fs (loop1): Unrecognized mount option "ÙSœ{¨syó=ígÉoñ»l8«Bìíµ‚ÂÛLûäˆ)" or missing value [ 3085.814073] FAT-fs (loop4): Directory bread(block 6) failed [ 3085.822070] FAT-fs (loop4): Directory bread(block 6) failed [ 3085.823477] FAT-fs (loop4): Directory bread(block 6) failed 23:51:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 4) 23:51:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x16000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:51:34 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x6, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:51:34 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="a200000003000000f8ffffffd7e44bafee3dc57300cb993c5a4c95923a221a7aa8ee6e68ae5083ae9ee4dcc7fb8dc0c44799ef8169e91ae90730ec5343ff989a3cc71f58df5bf66d28150bc5c3f5d71f553f07d98cfbee3fe9267ea9d3ca47ab26280ef87f263470107fc0b6b3de2ef1a9c2af59adc3e0c2355a38e9d48c527e3f8464d4d6ef3ad4d4ad5ce2b7a19f54846c424ccabf86b1add3f2c7dbd2d5000000000000000000000000000000acc66aa728d90977886f25e882c51bc3a3f63edeb304dfd8ebc697ea5ca4ffe962"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:51:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x220100, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r5, r7, 0x0, 0x80000001) connect$inet(r7, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) 23:51:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100dba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:51:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[@ANYBLOB="ae"]) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) r0 = socket$inet(0x2, 0x2, 0x5) sendmsg$sock(r0, &(0x7f00000008c0)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000240)="71d920482ac55fdd38673e29a582a249a99b52dd196b1072663f097bed4394f643cfb941063ac88bdce468986944139b41a787a7eda5927b842cf78262a288a17b2158a75ea19452d31f27757729ef1f0af0704e8411ccf340e4a39a10ad15b232d6101d706c455102", 0x69}, {&(0x7f00000002c0)="6462e2fef9480fe3b9914ff203828019cb01700ec255c96332c57015d09f2fc1906a8e51e6fec710f00faea860ba06bedcdb33c7e289a81f14a66a71f2b98d9e6d434fbca1fb8c44c6eb33ab66a2dfc95f43ef9885cddabdded58d859ca2978b18b0133a3fa7b29b17f77a33e0129b043b3ac804989036b4bf4f4da55c5539deea4fee5d0fb2bcb6af74a4c10015cd8b5d894dc8caec362fe53ea3c0da95ee548dd071aca91fd537b66b4f60fd23", 0xae}, {&(0x7f0000000380)="082c0754f0d8001b8d934d1ed7f65abdb98fd3790b8843bd66930a9ad0686521857d0ab01b1b2468c52099f1fdbb8d5bb39ee3c7aad82acbfbd2b9cf813f2e26fff39195172a2b24e90bdbc21767546d851c6a3eb7b08527c2f7176575012cb4e2d7d0fec373", 0x66}, {&(0x7f00000000c0)="7ff318e8933ccbee11793d761717069fa9247cb3246fda00e0119ad4d0d556b67730ac54a4e84da06a5a6f2b41fb8b2274473362eae858809fa6", 0x3a}, {&(0x7f0000000400)="da8ff0864b625f2968132d5adb22f1de36ae7fa4f1b4dd9b4469a221cc86f81d7955867424a55741dde3ae31", 0x2c}, {&(0x7f0000000440)="5dc7f8ccc686eace19bc79b43127c182b8b52641177484f64302cf1635ec2b350b19720d8d10acb397d1eae37a8a12f1282640319ee7fe4f185e1d0ca52b432a209595a5312623bcf22715c108bddf133a65ddb2e702589a1beb13dbf7b4c3b2191c6746e57793fe4b0b09421c0fbde8f203f02bd80b210dabe4b0c8499d2de8f44497345b711acb935597027b5f39f8f9b7bfef4dd4fbcd0d6b71c87d1978856a616fa7b504200f6bf5df53908c9b951d75b99bf27c44a4", 0xb8}, {&(0x7f0000000500)="c920eb010a2255e722a9b8154feeb49662529d318048b168d17477237f104e4a3a7f98ef4571e56bdee28acee279f469833b1d30ec5410fb1f947490e49e2caef7f407cb4e080d89032ed5deac161db8177614cca0d7716e623eb840786c86ffc971d2234ec67fa15aec7d1663c0a345beaebaba05f3e9ee009229b3433eb081fe1dba31c48c401ebb657ffa99535499e5103dbc7adfe0e5", 0x98}, {&(0x7f00000005c0)="7c5d9bdc76031e18709ccae9d98274e8172526797461a3c1a0fae2ff5a0b06c00c8152d9dc7beec62f9220a96e3f8bd62f4fbc11ecdcd09d8d05e910d22a827a481125510e27d6f46bc23cb61d53fae8a464322ef0eed22e3493a9d2268f40a601db9cc6a97d36573673c0e8718b55c1fe83d24f9b8c5bb6032c36463ef2fe6ccf7ca45c39b3cc9154e1056f73", 0x8d}, {&(0x7f0000000680)="ec25acc530220b7d5c630f861febd1fb72611f44e37bfc799348045bb0a4431028b454782d8e088edb9b245fc40133db29829463bd2271e63f0d9b6394e2a9711b2a60c5069f6fa6604f28556f28a64edc3fccd3d0a099d1ac983ba16893f147074f87a753a2caa4b24f3ee2c693df0bd63b773703cb2808f61941d7acab69355b951a1591a82bdf9a2852f02bf0f6f8de5a28f58faa4ecef7ab13550de81bb373a4533dbc560500b757b960da0d268a2648aeda1e920813c8ae9a7eb60351a6373b383b1216e5b608a627196904555382bf4f4609e7a296e0", 0xd9}, {&(0x7f0000000780)="190c06d4a54de6a608c68df3402977b014", 0x11}], 0xa, &(0x7f0000000880)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x18}, 0x40000) 23:51:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xfffffff6) [ 3085.838219] FAT-fs (loop4): Directory bread(block 6) failed [ 3085.842466] kauditd_printk_skb: 34 callbacks suppressed [ 3085.843746] audit: type=1326 audit(1703634694.782:5562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3085.853234] audit: type=1326 audit(1703634694.792:5563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3085.880060] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3085.884014] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3085.891224] EXT4-fs (loop2): mount failed [ 3085.893004] FAULT_INJECTION: forcing a failure. [ 3085.893004] name failslab, interval 1, probability 0, space 0, times 0 [ 3085.895235] CPU: 0 PID: 38401 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3085.896638] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3085.898281] Call Trace: [ 3085.898818] dump_stack+0x107/0x167 [ 3085.899564] should_fail.cold+0x5/0xa [ 3085.900336] ? shmem_alloc_inode+0x18/0x40 [ 3085.901183] should_failslab+0x5/0x20 [ 3085.901939] kmem_cache_alloc+0x5b/0x310 [ 3085.902056] audit: type=1326 audit(1703634694.793:5564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3085.902922] ? shmem_destroy_inode+0x70/0x70 [ 3085.902946] shmem_alloc_inode+0x18/0x40 [ 3085.902972] ? shmem_destroy_inode+0x70/0x70 [ 3085.910362] alloc_inode+0x63/0x240 [ 3085.911234] new_inode+0x23/0x250 [ 3085.912059] shmem_get_inode+0x15e/0xbc0 [ 3085.912876] __shmem_file_setup+0xb8/0x320 [ 3085.913720] ? _copy_from_user+0xfb/0x1b0 [ 3085.914550] __do_sys_memfd_create+0x275/0x450 [ 3085.915470] ? memfd_file_seals_ptr+0x170/0x170 [ 3085.916406] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3085.917446] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3085.918472] do_syscall_64+0x33/0x40 [ 3085.919208] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3085.920240] RIP: 0033:0x7f62fcff4b19 [ 3085.920979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3085.922052] FAT-fs (loop1): Unrecognized mount option "®" or missing value [ 3085.924628] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3085.924648] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3085.924659] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3085.924671] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3085.924682] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3085.924693] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 23:51:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 5) [ 3085.967567] audit: type=1326 audit(1703634694.825:5565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 23:51:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x1000000000000) [ 3086.024338] audit: type=1326 audit(1703634694.826:5566): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3086.029423] audit: type=1326 audit(1703634694.826:5567): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3086.033904] audit: type=1326 audit(1703634694.826:5568): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3086.038623] audit: type=1326 audit(1703634694.826:5569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3086.043392] audit: type=1326 audit(1703634694.850:5570): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3086.051765] audit: type=1326 audit(1703634694.856:5571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38383 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3086.052298] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3086.065706] FAULT_INJECTION: forcing a failure. [ 3086.065706] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.068080] CPU: 0 PID: 38423 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3086.069468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.071117] Call Trace: [ 3086.071655] dump_stack+0x107/0x167 [ 3086.072385] should_fail.cold+0x5/0xa [ 3086.073147] ? create_object.isra.0+0x3a/0xa20 [ 3086.074054] should_failslab+0x5/0x20 [ 3086.074813] kmem_cache_alloc+0x5b/0x310 [ 3086.075633] create_object.isra.0+0x3a/0xa20 [ 3086.076507] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3086.077511] kmem_cache_alloc+0x159/0x310 [ 3086.077867] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3086.078336] ? shmem_destroy_inode+0x70/0x70 [ 3086.078359] shmem_alloc_inode+0x18/0x40 [ 3086.082897] ? shmem_destroy_inode+0x70/0x70 [ 3086.083784] alloc_inode+0x63/0x240 [ 3086.084510] new_inode+0x23/0x250 [ 3086.085201] shmem_get_inode+0x15e/0xbc0 [ 3086.086014] __shmem_file_setup+0xb8/0x320 [ 3086.086858] ? _copy_from_user+0xfb/0x1b0 [ 3086.087693] __do_sys_memfd_create+0x275/0x450 [ 3086.088606] ? memfd_file_seals_ptr+0x170/0x170 [ 3086.089537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3086.090574] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3086.091622] do_syscall_64+0x33/0x40 [ 3086.092359] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3086.093378] RIP: 0033:0x7f62fcff4b19 [ 3086.094116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.096792] EXT4-fs (loop2): mount failed [ 3086.097842] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3086.097863] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3086.097875] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3086.097886] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3086.097898] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3086.097917] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 23:51:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3086.140985] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3086.143815] EXT4-fs (loop0): get root inode failed [ 3086.145079] EXT4-fs (loop0): mount failed 23:51:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 6) [ 3086.207127] FAT-fs (loop4): Directory bread(block 6) failed [ 3086.209706] FAT-fs (loop4): Directory bread(block 6) failed [ 3086.211143] FAT-fs (loop4): Directory bread(block 6) failed [ 3086.219166] FAT-fs (loop4): Directory bread(block 6) failed [ 3086.281922] FAULT_INJECTION: forcing a failure. [ 3086.281922] name failslab, interval 1, probability 0, space 0, times 0 [ 3086.284485] CPU: 1 PID: 38524 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3086.285964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3086.287737] Call Trace: 23:51:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100eba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 3086.288271] dump_stack+0x107/0x167 [ 3086.289173] should_fail.cold+0x5/0xa [ 3086.289951] ? security_inode_alloc+0x34/0x160 [ 3086.291003] should_failslab+0x5/0x20 [ 3086.291827] kmem_cache_alloc+0x5b/0x310 [ 3086.292720] security_inode_alloc+0x34/0x160 [ 3086.293631] inode_init_always+0xa4e/0xd10 [ 3086.294492] ? shmem_destroy_inode+0x70/0x70 [ 3086.295400] alloc_inode+0x84/0x240 [ 3086.296288] new_inode+0x23/0x250 [ 3086.297118] shmem_get_inode+0x15e/0xbc0 [ 3086.298244] __shmem_file_setup+0xb8/0x320 [ 3086.299304] ? _copy_from_user+0xfb/0x1b0 [ 3086.300447] __do_sys_memfd_create+0x275/0x450 [ 3086.301734] ? memfd_file_seals_ptr+0x170/0x170 [ 3086.302766] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3086.303883] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3086.305050] do_syscall_64+0x33/0x40 [ 3086.305830] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3086.306880] RIP: 0033:0x7f62fcff4b19 [ 3086.307676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3086.312223] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3086.313772] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3086.315434] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3086.317057] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3086.318873] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3086.320767] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3086.328535] FAT-fs (loop1): Unrecognized mount option "®" or missing value 23:51:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x8000000000000) 23:51:35 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:51:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3086.471439] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3086.493610] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3086.527824] EXT4-fs (loop2): mount failed [ 3086.624734] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3086.644858] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3086.672887] EXT4-fs (loop2): mount failed 23:51:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 7) 23:51:50 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) [ 3101.152779] FAULT_INJECTION: forcing a failure. [ 3101.152779] name failslab, interval 1, probability 0, space 0, times 0 [ 3101.154202] CPU: 0 PID: 38659 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3101.155072] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3101.156106] Call Trace: [ 3101.156451] dump_stack+0x107/0x167 [ 3101.156916] should_fail.cold+0x5/0xa [ 3101.157409] ? create_object.isra.0+0x3a/0xa20 [ 3101.157965] should_failslab+0x5/0x20 [ 3101.158447] kmem_cache_alloc+0x5b/0x310 [ 3101.158961] create_object.isra.0+0x3a/0xa20 [ 3101.159512] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3101.160155] kmem_cache_alloc+0x159/0x310 [ 3101.160684] security_inode_alloc+0x34/0x160 [ 3101.161225] inode_init_always+0xa4e/0xd10 [ 3101.161742] ? shmem_destroy_inode+0x70/0x70 [ 3101.162286] alloc_inode+0x84/0x240 [ 3101.162731] new_inode+0x23/0x250 [ 3101.163154] shmem_get_inode+0x15e/0xbc0 [ 3101.163669] __shmem_file_setup+0xb8/0x320 [ 3101.164185] ? _copy_from_user+0xfb/0x1b0 [ 3101.164693] __do_sys_memfd_create+0x275/0x450 [ 3101.165254] ? memfd_file_seals_ptr+0x170/0x170 [ 3101.165830] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3101.166475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3101.167103] do_syscall_64+0x33/0x40 [ 3101.167568] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3101.168194] RIP: 0033:0x7f62fcff4b19 [ 3101.168666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3101.170968] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3101.171920] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3101.172821] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3101.173720] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3101.174622] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3101.175517] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3101.194828] FAT-fs (loop4): Directory bread(block 6) failed 23:51:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100f00, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:51:50 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r5 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x3f, 0x0, 0x3, 0x7, 0x0, 0xd385, 0x2040, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x101, 0x1, @perf_config_ext={0x10b0}, 0x10200, 0x200, 0xbd75, 0x6, 0x6, 0x800, 0x7b, 0x0, 0x40, 0x0, 0xfffffffffffffff8}, r5, 0x2, 0xffffffffffffffff, 0xa) 23:51:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17, 0x40}, {&(0x7f0000000040)="01045a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000010d00)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:51:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xe000000000000) 23:51:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:51:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x800, 0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r4, r6, 0x0, 0x80000001) openat(r4, &(0x7f00000000c0)='./file1\x00', 0x4000, 0x80) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3101.207322] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.210877] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.213274] kauditd_printk_skb: 28 callbacks suppressed [ 3101.213293] audit: type=1326 audit(1703634710.153:5600): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.215376] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.220811] audit: type=1326 audit(1703634710.153:5601): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.237993] audit: type=1326 audit(1703634710.160:5602): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.242332] FAT-fs (loop1): bogus number of reserved sectors [ 3101.243639] FAT-fs (loop1): Can't find a valid FAT filesystem [ 3101.245600] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3101.252215] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3101.260359] EXT4-fs (loop2): mount failed [ 3101.268908] audit: type=1326 audit(1703634710.161:5603): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.309355] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3101.312015] audit: type=1326 audit(1703634710.161:5604): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.316157] EXT4-fs (loop0): get root inode failed [ 3101.317414] EXT4-fs (loop0): mount failed 23:51:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0xf0ffffffffffff) [ 3101.322718] audit: type=1326 audit(1703634710.170:5605): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3101.322782] FAT-fs (loop1): bogus number of reserved sectors [ 3101.325859] audit: type=1326 audit(1703634710.170:5606): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3101.326430] FAT-fs (loop1): Can't find a valid FAT filesystem 23:51:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3101.328977] audit: type=1326 audit(1703634710.171:5607): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3101.333363] audit: type=1326 audit(1703634710.171:5608): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3101.352662] audit: type=1326 audit(1703634710.171:5609): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38658 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:51:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100fba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:51:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00dc2f7f53308ac114cfcb64be3d1b85f7f998d7aec990b56f88b28987d988d941ce6c181ad74166ae62f5d88d032ac3cf897f700eae19fcc150b684a6ee429a514e2817b68aa2b07038fe9deaa7ef5c65a9dc0866b3cc061895272cdbf0e8a378a069bcc5fc7cc4e2e6eeb58b59025085692aaf8a405f137ce5"]) r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x1000000, 0x4100010, r0, 0x0) r2 = syz_io_uring_setup(0x24, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r2}, 0x0) openat(r0, &(0x7f0000000340)='./file0/file0\x00', 0x2000, 0x104) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x1, 0x2007, @fd_index=0x9, 0x3, &(0x7f0000000240)="e00f525acd9d062c74e38dc40af6dd0c0cb9c2740a837f7c216dd5d8808ab1f4ef87c2b176229bc668310b14269b17458ac15a8b913a3343ac8afa2035df6c18cdfd926426b087e6de9bf1cff00bdff2036d8a7bc2157e2177ce38c9325b24d38d6f46af89cf91e518b571057ce8b97f8894c2176495c6ae4240a800847c4275f9a61895ff582e59331df102a5785055f11cfe1a75d0b2c8ea457ad86b045fd3777b5204752dfdb144a66b1fbf35f4b228ca080f35ba9ea220924a899d0f75cd8550b2f5acc73ce889be0c1bc4b1f53ab3e2c44d2514290ec23d1770ae03f18e4045f5bb71f4299db28efff8717fffb233e6d7a38a09d43144", 0xf9, 0x10}, 0xfff) [ 3101.460149] FAT-fs (loop1): Directory bread(block 6) failed [ 3101.461784] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3101.462829] FAT-fs (loop1): Filesystem has been set read-only 23:51:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 8) [ 3101.470233] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3101.484109] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.502248] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.504126] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.536898] FAT-fs (loop4): Directory bread(block 6) failed [ 3101.562567] FAULT_INJECTION: forcing a failure. [ 3101.562567] name failslab, interval 1, probability 0, space 0, times 0 [ 3101.564046] CPU: 0 PID: 38785 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3101.564904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3101.565774] Call Trace: [ 3101.566059] dump_stack+0x107/0x167 [ 3101.566448] should_fail.cold+0x5/0xa [ 3101.566854] ? __d_alloc+0x2a/0x990 [ 3101.567248] should_failslab+0x5/0x20 [ 3101.567669] kmem_cache_alloc+0x5b/0x310 [ 3101.568095] ? trace_hardirqs_on+0x5b/0x180 [ 3101.568555] __d_alloc+0x2a/0x990 [ 3101.568929] d_alloc_pseudo+0x19/0x70 [ 3101.569333] alloc_file_pseudo+0xce/0x250 [ 3101.569771] ? alloc_file+0x5a0/0x5a0 [ 3101.570178] ? shmem_get_inode+0x55c/0xbc0 [ 3101.570631] __shmem_file_setup+0x144/0x320 [ 3101.571101] ? _copy_from_user+0xfb/0x1b0 [ 3101.571550] __do_sys_memfd_create+0x275/0x450 [ 3101.572049] ? memfd_file_seals_ptr+0x170/0x170 [ 3101.572543] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3101.573097] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3101.573651] do_syscall_64+0x33/0x40 [ 3101.574049] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3101.574605] RIP: 0033:0x7f62fcff4b19 [ 3101.575001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3101.576957] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3101.577777] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3101.578532] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3101.579278] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3101.580046] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3101.580797] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3101.590529] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3101.598112] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3101.618837] EXT4-fs (loop2): mount failed [ 3101.678901] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3101.681644] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3101.685170] EXT4-fs (loop2): mount failed 23:52:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x100000000000000) 23:52:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="a3"]) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r0, 0x8000000) r1 = getpid() process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x340100, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) r5 = syz_io_uring_setup(0x24, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r5}, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000340)=@IORING_OP_WRITEV={0x2, 0x2, 0x4007, @fd_index=0x6, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="43c4643d394eb73a5960e0a9b861", 0xe}], 0x1, 0x16}, 0x53a) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x6) 23:52:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00a882219c0430b26dffbde11ab7ed028b64c53af6ff6425f6776a05ec76dc4b60808319239fec49cd14e41ebbe6beb0972d6be81169cae1cf4ff6da43f9276cf56d46f1b27e6d32c3bc3b87d1faab6d9462a901a53fcce40b66fe046f79b39c1dfde58d7f4d95a95f145f6858b939b20ab26c0231c75d40e9f4fced1a933502a114ecdaa1bc287680be35439bc4c79882d1439229afa595ee9edcc6b4ecff58ae765a74a6d01a"]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) lstat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) signalfd(r1, &(0x7f00000000c0)={[0x9]}, 0x8) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:52:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0f7f1d6e496577b1ffea9a4e840d8bfb977e9314359c0811dfe37634e695000000004dee2a14ccc19a3367291faed02d7eed6facc6e5a302e32ea79b3acd8257fd8c469a955f2e3a48c724a3d4662c4c782c68a6f7e068c0fbcaf6bd82"]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, 0x0, @fixed}, &(0x7f0000000280)=0xe, 0x80000) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000300)={0x5, 0x80000001, 0x4, 0x80000000, 0x4, 0x20}) mount$bind(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000240), 0x15c019, 0x0) getpid() openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:52:05 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:52:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x101020, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:52:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 9) 23:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3116.484459] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.496221] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.496984] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.505829] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.514216] FAULT_INJECTION: forcing a failure. [ 3116.514216] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.515579] CPU: 1 PID: 38843 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3116.516458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.517517] Call Trace: [ 3116.517818] dump_stack+0x107/0x167 [ 3116.518223] should_fail.cold+0x5/0xa [ 3116.518689] ? create_object.isra.0+0x3a/0xa20 [ 3116.519234] should_failslab+0x5/0x20 [ 3116.519726] kmem_cache_alloc+0x5b/0x310 [ 3116.520245] create_object.isra.0+0x3a/0xa20 [ 3116.520862] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3116.521423] kmem_cache_alloc+0x159/0x310 [ 3116.521887] __d_alloc+0x2a/0x990 [ 3116.522296] d_alloc_pseudo+0x19/0x70 [ 3116.522739] alloc_file_pseudo+0xce/0x250 [ 3116.523199] ? alloc_file+0x5a0/0x5a0 [ 3116.523647] ? shmem_get_inode+0x55c/0xbc0 [ 3116.524188] __shmem_file_setup+0x144/0x320 [ 3116.524698] ? _copy_from_user+0xfb/0x1b0 [ 3116.525176] __do_sys_memfd_create+0x275/0x450 [ 3116.525703] ? memfd_file_seals_ptr+0x170/0x170 [ 3116.526247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.526844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.527442] do_syscall_64+0x33/0x40 [ 3116.527873] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.528481] RIP: 0033:0x7f62fcff4b19 [ 3116.529029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.531374] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3116.532306] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3116.533128] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3116.533946] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3116.534741] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3116.535657] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3116.542701] kauditd_printk_skb: 14 callbacks suppressed [ 3116.542717] audit: type=1326 audit(1703634725.482:5624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.549756] audit: type=1326 audit(1703634725.482:5625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.554024] audit: type=1326 audit(1703634725.482:5626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.559093] audit: type=1326 audit(1703634725.482:5627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.579125] audit: type=1326 audit(1703634725.482:5628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.584311] FAT-fs (loop1): Directory bread(block 6) failed 23:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3116.604550] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3116.612021] EXT4-fs (loop0): get root inode failed [ 3116.613231] EXT4-fs (loop0): mount failed [ 3116.621296] audit: type=1326 audit(1703634725.486:5629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3116.622619] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3116.646668] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. 23:52:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x200000000000000) [ 3116.658121] audit: type=1326 audit(1703634725.489:5630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3116.663797] EXT4-fs (loop2): mount failed [ 3116.676593] audit: type=1326 audit(1703634725.489:5631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3116.678388] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3116.680930] FAT-fs (loop1): Filesystem has been set read-only [ 3116.686791] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3116.691809] audit: type=1326 audit(1703634725.489:5632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3116.704798] audit: type=1326 audit(1703634725.489:5633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=38832 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 23:52:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 10) [ 3116.763031] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3116.764914] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3116.772161] EXT4-fs (loop2): mount failed [ 3116.778945] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.795192] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.795918] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.798636] FAT-fs (loop4): Directory bread(block 6) failed 23:52:05 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:52:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x300000000000000) [ 3116.829397] FAULT_INJECTION: forcing a failure. [ 3116.829397] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.830659] CPU: 1 PID: 38967 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3116.831411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.832423] Call Trace: [ 3116.832708] dump_stack+0x107/0x167 [ 3116.833112] should_fail.cold+0x5/0xa [ 3116.833532] ? __alloc_file+0x21/0x320 [ 3116.833957] should_failslab+0x5/0x20 [ 3116.834369] kmem_cache_alloc+0x5b/0x310 [ 3116.834817] __alloc_file+0x21/0x320 [ 3116.835216] alloc_empty_file+0x6d/0x170 [ 3116.835649] alloc_file+0x5e/0x5a0 [ 3116.836107] alloc_file_pseudo+0x16a/0x250 [ 3116.836653] ? alloc_file+0x5a0/0x5a0 [ 3116.837060] ? shmem_get_inode+0x55c/0xbc0 [ 3116.837508] __shmem_file_setup+0x144/0x320 [ 3116.837963] ? _copy_from_user+0xfb/0x1b0 [ 3116.838396] __do_sys_memfd_create+0x275/0x450 [ 3116.838877] ? memfd_file_seals_ptr+0x170/0x170 [ 3116.839371] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.839941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.840488] do_syscall_64+0x33/0x40 [ 3116.840881] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.841420] RIP: 0033:0x7f62fcff4b19 [ 3116.841820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.843760] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3116.844581] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3116.845350] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3116.846150] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3116.846895] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3116.847661] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3116.859429] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) 23:52:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1010ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 3116.877931] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start 0000006c) [ 3116.897045] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3116.901465] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3116.907389] EXT4-fs (loop2): mount failed 23:52:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3116.921789] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.956964] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.971369] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.983839] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3116.990706] FAT-fs (loop4): Directory bread(block 6) failed [ 3116.999089] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3117.016734] EXT4-fs (loop2): mount failed 23:52:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x400000000000000) 23:52:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000f85aee291a221fe91e42f57df531e1a05ca14decaac55276aa0753ca50f10be6675c05ca11a38ae8ebbd728a3c2251640fa9e949b8d0a6c7719a87f087e4b47dae", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file1\x00']) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x3ff, 0xf, 0xf, 0x10, "ab50e53b536fb76d8b5a5595862c34b101cf12fa150584542d64d3ac14a6b4eb01926b6b8f14d049ab0fcea6b529c54532bb63882176b7f55faf48ec6b14548c", "c24cc14e010d8680a0eed2240490a1fea55df4b98fc24dae1a9ba6d9014a4b7f", [0x1ff, 0x5]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) getpid() openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) fchmod(r5, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000000380)=0x33, 0x4) connect$bt_l2cap(r6, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) [ 3132.216529] FAT-fs (loop4): Directory bread(block 6) failed 23:52:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x101100, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) 23:52:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:52:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020106c64093968901b8c34d0b473d0d56c", 0x5b, 0x600}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="e1d1fb116b4b350391aade0700000000802b5d0bc6e7d5ef424a5293aa167f000000c902f81396e19ba7ec01211f81c37d88e8d1107d0a6068df0f08c25370dc53541de814ead6383ce6cd80a2c8894cc270170f935193d9f2e2d1cbad71de910291e417939bb79eae378b43009891d807f3f9d2738d61d7db5a9959223b06ae645d50961823be9600c95864c01c045611466bc1fef786783887f1a58a8210bfb92c95a25687539d20f6723df3aa55cdf8abfc477dbdaacb74621b799d6396dd8b7d73e9c89c6da2ad304e5c94"]) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) 23:52:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 11) 23:52:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200180, 0x1a0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, r0, 0x0) truncate(&(0x7f0000001040)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00']) r2 = getpid() process_vm_readv(r2, &(0x7f0000000240)=[{&(0x7f0000000140)=""/193, 0xc1}], 0x1, &(0x7f0000000380)=[{&(0x7f0000003300)=""/4096, 0xd00}], 0x1, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1000000, 0x13, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f00000000c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x40002102, 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000140)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {0x0, r6}], 0x7f, "9656c75f04ba4d"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000055b00)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056b00)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {r9}], 0x8, "882667abb4e962"}) r10 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r10, 0x0, 0x100000001) openat(r4, &(0x7f0000000280)='./file1\x00', 0x10200, 0x0) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r11, &(0x7f0000000000)={0x1f, 0x5, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0xe) 23:52:21 executing program 7: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) ptrace(0x8, r2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x1c5143, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) sendfile(r3, r5, 0x0, 0x80000001) [ 3132.232550] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.233594] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.234776] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.236958] FAULT_INJECTION: forcing a failure. [ 3132.236958] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.238253] CPU: 0 PID: 39113 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3132.239036] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.240001] Call Trace: [ 3132.240306] dump_stack+0x107/0x167 [ 3132.240734] should_fail.cold+0x5/0xa [ 3132.241173] ? create_object.isra.0+0x3a/0xa20 [ 3132.241705] should_failslab+0x5/0x20 [ 3132.242133] kmem_cache_alloc+0x5b/0x310 [ 3132.242594] create_object.isra.0+0x3a/0xa20 [ 3132.243096] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3132.243686] kmem_cache_alloc+0x159/0x310 [ 3132.244163] __alloc_file+0x21/0x320 [ 3132.244595] alloc_empty_file+0x6d/0x170 [ 3132.245072] alloc_file+0x5e/0x5a0 [ 3132.245483] alloc_file_pseudo+0x16a/0x250 [ 3132.245958] ? alloc_file+0x5a0/0x5a0 [ 3132.246393] ? shmem_get_inode+0x55c/0xbc0 [ 3132.246878] __shmem_file_setup+0x144/0x320 [ 3132.247361] ? _copy_from_user+0xfb/0x1b0 [ 3132.247833] __do_sys_memfd_create+0x275/0x450 [ 3132.248377] ? memfd_file_seals_ptr+0x170/0x170 [ 3132.248925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3132.249537] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.250135] do_syscall_64+0x33/0x40 [ 3132.250577] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3132.251170] RIP: 0033:0x7f62fcff4b19 [ 3132.251609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.253757] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3132.254645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3132.255476] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3132.256321] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3132.257155] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3132.257989] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3132.266470] kauditd_printk_skb: 33 callbacks suppressed [ 3132.267852] audit: type=1326 audit(1703634741.206:5667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3132.276985] audit: type=1326 audit(1703634741.217:5668): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3132.283706] FAT-fs (loop1): Unrecognized mount option "áÑûkK5‘ªÞ" or missing value ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r6, 0x0) 23:52:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x55030400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3132.323900] audit: type=1326 audit(1703634741.228:5669): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3132.326633] audit: type=1326 audit(1703634741.228:5670): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3132.329704] audit: type=1326 audit(1703634741.259:5671): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f671d7c5b19 code=0x7ffc0000 [ 3132.332346] audit: type=1326 audit(1703634741.259:5672): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f671d7c5ad7 code=0x7ffc0000 [ 3132.336103] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3132.336342] audit: type=1326 audit(1703634741.259:5673): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3132.340444] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3132.341843] audit: type=1326 audit(1703634741.260:5674): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3132.347014] EXT4-fs (loop0): get root inode failed [ 3132.348100] EXT4-fs (loop0): mount failed [ 3132.349504] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3132.355308] audit: type=1326 audit(1703634741.260:5675): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3132.357520] FAT-fs (loop1): Unrecognized mount option "áÑûkK5‘ªÞ" or missing value [ 3132.370487] audit: type=1326 audit(1703634741.260:5676): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=39114 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f671d778ab7 code=0x7ffc0000 [ 3132.386923] EXT4-fs (loop2): mount failed 23:52:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x500000000000000) 23:52:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020ff20a28916478fa11b20106c64093958901b8c", 0x5b, 0x600}], 0x80000, &(0x7f0000010d00)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x170) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) dup2(r0, r2) 23:52:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x56030400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) 23:52:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 12) [ 3132.514070] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3132.517359] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.519099] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.522063] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3132.524714] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.526624] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.531479] EXT4-fs (loop2): mount failed 23:52:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300)="53595a4b414c4c45522020080000e980325132510000e980325100000000000041660069006c00650030000f", 0x2c, 0x600}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file1\x00', 0x0, 0x600000000000000) 23:52:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1011ba, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f000000000000040040", 0x1d, 0x2100}], 0x0, &(0x7f0000014100)) [ 3132.613741] FAULT_INJECTION: forcing a failure. [ 3132.613741] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.617170] CPU: 1 PID: 39228 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3132.618781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.620744] Call Trace: [ 3132.621371] dump_stack+0x107/0x167 [ 3132.622291] should_fail.cold+0x5/0xa [ 3132.623117] ? security_file_alloc+0x34/0x170 [ 3132.624165] should_failslab+0x5/0x20 [ 3132.624938] kmem_cache_alloc+0x5b/0x310 [ 3132.625766] security_file_alloc+0x34/0x170 [ 3132.626643] __alloc_file+0xb7/0x320 [ 3132.627491] alloc_empty_file+0x6d/0x170 [ 3132.628419] alloc_file+0x5e/0x5a0 [ 3132.629254] alloc_file_pseudo+0x16a/0x250 [ 3132.630110] ? alloc_file+0x5a0/0x5a0 [ 3132.630900] ? shmem_get_inode+0x55c/0xbc0 [ 3132.631766] __shmem_file_setup+0x144/0x320 [ 3132.632658] ? _copy_from_user+0xfb/0x1b0 [ 3132.633509] __do_sys_memfd_create+0x275/0x450 [ 3132.634447] ? memfd_file_seals_ptr+0x170/0x170 [ 3132.635392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3132.636567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.637624] do_syscall_64+0x33/0x40 [ 3132.638381] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3132.639418] RIP: 0033:0x7f62fcff4b19 [ 3132.640181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.643952] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3132.645549] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3132.647144] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3132.648720] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3132.650321] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3132.651995] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 23:52:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5d030400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000240008000f801", 0x17}, {&(0x7f0000010300), 0x0, 0x600}], 0x0, &(0x7f0000000040)={[{@utf8no}]}) [ 3132.708823] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.726310] FAT-fs (loop4): Directory bread(block 6) failed 23:52:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="eb11e8821c2fdca46ba8", 0xa, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}], 0x0, &(0x7f0000014100)) (fail_nth: 13) [ 3132.732366] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.736191] FAT-fs (loop4): Directory bread(block 6) failed [ 3132.785103] FAULT_INJECTION: forcing a failure. [ 3132.785103] name failslab, interval 1, probability 0, space 0, times 0 [ 3132.787660] CPU: 1 PID: 39263 Comm: syz-executor.0 Not tainted 5.10.205 #1 [ 3132.789098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3132.789572] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3132.790793] Call Trace: [ 3132.790817] dump_stack+0x107/0x167 [ 3132.790841] should_fail.cold+0x5/0xa [ 3132.790869] ? create_object.isra.0+0x3a/0xa20 [ 3132.793750] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3132.793802] should_failslab+0x5/0x20 [ 3132.796303] EXT4-fs (loop2): mount failed [ 3132.799174] kmem_cache_alloc+0x5b/0x310 [ 3132.799194] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 3132.799215] create_object.isra.0+0x3a/0xa20 [ 3132.799235] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3132.799261] kmem_cache_alloc+0x159/0x310 [ 3132.805659] security_file_alloc+0x34/0x170 [ 3132.806664] __alloc_file+0xb7/0x320 [ 3132.807431] alloc_empty_file+0x6d/0x170 [ 3132.808371] alloc_file+0x5e/0x5a0 [ 3132.809101] alloc_file_pseudo+0x16a/0x250 [ 3132.809975] ? alloc_file+0x5a0/0x5a0 [ 3132.810849] ? shmem_get_inode+0x55c/0xbc0 [ 3132.811784] __shmem_file_setup+0x144/0x320 [ 3132.812784] ? _copy_from_user+0xfb/0x1b0 [ 3132.813718] __do_sys_memfd_create+0x275/0x450 [ 3132.814658] ? memfd_file_seals_ptr+0x170/0x170 [ 3132.815610] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3132.816752] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3132.817920] do_syscall_64+0x33/0x40 [ 3132.818822] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3132.819842] RIP: 0033:0x7f62fcff4b19 [ 3132.820622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3132.824353] RSP: 002b:00007f62fa569f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 3132.825897] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f62fcff4b19 [ 3132.827348] RDX: 0000000000001000 RSI: 0000000000000000 RDI: 00007f62fd04e0fb [ 3132.828828] RBP: 0000000000000004 R08: 0000000000000800 R09: ffffffffffffffff [ 3132.830277] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000008100000 [ 3132.831732] R13: 0000000020000100 R14: 0000000000100000 R15: 0000000020014100 [ 3132.899658] EXT4-fs error (device loop2): ext4_quota_enable:6418: comm syz-executor.2: Bad quota inum: 2196247019, type: 0 [ 3132.902262] EXT4-fs warning (device loop2): ext4_enable_quotas:6463: Failed to enable quota tracking (type=0, err=-117, ino=2196247019). Please run e2fsck to fix. [ 3132.907082] EXT4-fs (loop2): mount failed [ 3132.968979] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3132.972853] EXT4-fs (loop0): get root inode failed [ 3132.974001] EXT4-fs (loop0): mount failed BUG: leak checking failed VM DIAGNOSIS: 23:52:22 Registers: info registers vcpu 0 RAX=ffffffff83e5e480 RBX=0000000000000000 RCX=ffffffff83e4653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e5ea88 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85672788 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5e48e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe2200000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555555e4ec58 CR3=00000000445a6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=ffff888015907dc8 RCX=1ffff11002b20f01 RDX=dffffc0000000000 RSI=ffff888015907d98 RDI=ffff8880159078b8 RBP=ffff888015900000 RSP=ffff8880159077d0 R8 =0000000000000001 R9 =0000000000000001 R10=0000000000032042 R11=1ffff11002b20f02 R12=ffff888015907dc8 R13=ffff8880159078a8 R14=1ffff11002b20f02 R15=ffffffff85a1d0ea RIP=ffffffff8110761b RFL=00000287 [--S--PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f7ebeb6c8c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe2a00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc48de53d80 CR3=000000000cce0000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=0000000000000131000065636172742f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000055c5fd8142a0000055c5fd80f910 XMM06=000055c5fd7eb2a00000000000000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000