b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 27) [ 462.544458][T19389] FAULT_INJECTION: forcing a failure. [ 462.544458][T19389] name failslab, interval 1, probability 0, space 0, times 0 [ 462.557172][T19389] CPU: 0 PID: 19389 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 462.565615][T19389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.575682][T19389] Call Trace: [ 462.579057][T19389] dump_stack_lvl+0xd6/0x122 [ 462.583668][T19389] dump_stack+0x11/0x1b [ 462.587871][T19389] should_fail+0x23c/0x250 [ 462.592303][T19389] ? radix_tree_node_alloc+0x142/0x200 [ 462.597797][T19389] __should_failslab+0x81/0x90 [ 462.602579][T19389] should_failslab+0x5/0x20 [ 462.607186][T19389] kmem_cache_alloc+0x4f/0x320 [ 462.612053][T19389] radix_tree_node_alloc+0x142/0x200 [ 462.617392][T19389] ? __kfree_skb+0xfe/0x150 [ 462.621940][T19389] idr_get_free+0x22a/0x5d0 [ 462.626459][T19389] idr_alloc_cyclic+0xf4/0x2f0 [ 462.631238][T19389] __kernfs_new_node+0xb4/0x340 [ 462.636169][T19389] ? ___cache_free+0x46/0x300 [ 462.640994][T19389] ? kmem_cache_free+0x5e/0x100 [ 462.646091][T19389] ? kfree+0xf8/0x1f0 [ 462.650091][T19389] kernfs_create_dir_ns+0x5e/0x140 [ 462.655222][T19389] internal_create_group+0x148/0x860 [ 462.660584][T19389] sysfs_create_group+0x1b/0x20 [ 462.665490][T19389] loop_configure+0xc58/0xf30 [ 462.670188][T19389] lo_ioctl+0x583/0x1270 [ 462.674440][T19389] ? unlock_page+0x37/0x50 [ 462.678880][T19389] ? __rcu_read_unlock+0x5c/0x290 [ 462.683924][T19389] ? blkdev_common_ioctl+0x438/0x1120 [ 462.689316][T19389] ? do_vfs_ioctl+0x819/0x14a0 [ 462.694101][T19389] ? lo_release+0x120/0x120 [ 462.698704][T19389] blkdev_ioctl+0x20e/0x440 [ 462.703220][T19389] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 462.708799][T19389] __se_sys_ioctl+0xcb/0x140 [ 462.713492][T19389] __x64_sys_ioctl+0x3f/0x50 [ 462.718102][T19389] do_syscall_64+0x44/0xa0 [ 462.722543][T19389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 462.728557][T19389] RIP: 0033:0x7f41f34498a7 [ 462.732983][T19389] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 462.752848][T19389] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.761264][T19389] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 462.769278][T19389] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 462.777260][T19389] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 462.785246][T19389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 462.793233][T19389] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 462.801466][T19389] loop3: detected capacity change from 0 to 4 [ 462.812245][T19389] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 462.893401][T19381] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:24 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0x200000000012, &(0x7f0000000000)={0xfffffffc, 0x0, 0xfffffffffffffff9}) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r4, 0x7ffffc, 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[], 0xffac) truncate(&(0x7f0000000040)='./bus\x00', 0x5e1) fallocate(r3, 0x0, 0x0, 0x80019c) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0x13d) lseek(r4, 0x0, 0x3) fcntl$setown(r0, 0x8, r2) rt_tgsigqueueinfo(r2, 0x0, 0xb, &(0x7f0000000000)={0x21, 0xc3, 0x5}) r5 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r5, r5, 0x0, 0x3) fsmount(0xffffffffffffffff, 0x0, 0x80) 12:39:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r2, r3, &(0x7f0000000180)=0x2, 0x83a) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:39:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 28) [ 462.996749][T19401] FAULT_INJECTION: forcing a failure. [ 462.996749][T19401] name failslab, interval 1, probability 0, space 0, times 0 [ 463.009684][T19401] CPU: 1 PID: 19401 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 463.018121][T19401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.028157][T19401] Call Trace: [ 463.031421][T19401] dump_stack_lvl+0xd6/0x122 [ 463.036008][T19401] dump_stack+0x11/0x1b [ 463.040156][T19401] should_fail+0x23c/0x250 [ 463.044765][T19401] ? radix_tree_node_alloc+0x142/0x200 [ 463.050377][T19401] __should_failslab+0x81/0x90 [ 463.055164][T19401] should_failslab+0x5/0x20 [ 463.059698][T19401] kmem_cache_alloc+0x4f/0x320 [ 463.064447][T19401] ? radix_tree_node_alloc+0x142/0x200 [ 463.069894][T19401] radix_tree_node_alloc+0x142/0x200 [ 463.075214][T19401] ? __kfree_skb+0xfe/0x150 [ 463.079728][T19401] idr_get_free+0x22a/0x5d0 [ 463.084267][T19401] idr_alloc_cyclic+0xf4/0x2f0 [ 463.089015][T19401] __kernfs_new_node+0xb4/0x340 [ 463.093904][T19401] ? ___cache_free+0x46/0x300 [ 463.098616][T19401] ? debug_smp_processor_id+0x18/0x20 [ 463.104015][T19401] ? delay_tsc+0x96/0xe0 [ 463.108240][T19401] kernfs_create_dir_ns+0x5e/0x140 [ 463.113413][T19401] internal_create_group+0x148/0x860 [ 463.118685][T19401] sysfs_create_group+0x1b/0x20 [ 463.123545][T19401] loop_configure+0xc58/0xf30 [ 463.128210][T19401] lo_ioctl+0x583/0x1270 [ 463.132436][T19401] ? unlock_page+0x37/0x50 [ 463.136903][T19401] ? __rcu_read_unlock+0x5c/0x290 [ 463.141943][T19401] ? debug_smp_processor_id+0x18/0x20 [ 463.147366][T19401] ? blkdev_common_ioctl+0x438/0x1120 [ 463.152769][T19401] ? lo_release+0x120/0x120 [ 463.157254][T19401] blkdev_ioctl+0x20e/0x440 [ 463.161747][T19401] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 463.167219][T19401] __se_sys_ioctl+0xcb/0x140 [ 463.171796][T19401] __x64_sys_ioctl+0x3f/0x50 [ 463.176461][T19401] do_syscall_64+0x44/0xa0 [ 463.180910][T19401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 463.186818][T19401] RIP: 0033:0x7f41f34498a7 [ 463.191218][T19401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 463.210825][T19401] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.219237][T19401] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 463.227197][T19401] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 463.235155][T19401] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 463.243212][T19401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 463.251166][T19401] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 463.259230][T19402] loop1: detected capacity change from 0 to 1054 [ 463.267070][T19401] loop3: detected capacity change from 0 to 4 [ 463.267519][T19395] loop2: detected capacity change from 0 to 4 [ 463.280398][T19395] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 463.288357][T19402] EXT4-fs (loop1): bad geometry: block count 537 exceeds size of device (527 blocks) 12:39:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x107fffffff, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r1, r0, &(0x7f0000000000), 0xffffffff) 12:39:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 463.298512][T19398] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 463.313126][T19401] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 463.324995][T19395] loop2: detected capacity change from 0 to 4 [ 463.331883][T19395] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000b0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0xffffffffffffffca, 0x103382) sendfile(r0, r0, 0x0, 0x40003) 12:39:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 29) [ 463.402645][T19412] loop1: detected capacity change from 0 to 1054 [ 463.416222][T19412] EXT4-fs (loop1): bad geometry: block count 768 exceeds size of device (527 blocks) [ 463.429258][T19414] loop2: detected capacity change from 0 to 4 [ 463.436434][T19414] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 463.483451][T19419] FAULT_INJECTION: forcing a failure. [ 463.483451][T19419] name failslab, interval 1, probability 0, space 0, times 0 [ 463.496284][T19419] CPU: 0 PID: 19419 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 463.504773][T19419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.514989][T19419] Call Trace: [ 463.518277][T19419] dump_stack_lvl+0xd6/0x122 [ 463.522911][T19419] dump_stack+0x11/0x1b [ 463.527090][T19419] should_fail+0x23c/0x250 [ 463.531522][T19419] ? __kernfs_new_node+0x6a/0x340 [ 463.536576][T19419] __should_failslab+0x81/0x90 [ 463.541366][T19419] should_failslab+0x5/0x20 [ 463.545973][T19419] kmem_cache_alloc+0x4f/0x320 [ 463.550864][T19419] __kernfs_new_node+0x6a/0x340 [ 463.555735][T19419] ? __down_write_common+0x42/0x860 [ 463.560954][T19419] ? idr_alloc_cyclic+0x26b/0x2f0 [ 463.566040][T19419] ? __down_write_common+0x42/0x860 [ 463.571277][T19419] ? rb_insert_color+0x7e/0x310 [ 463.576148][T19419] kernfs_new_node+0x5b/0xd0 [ 463.580859][T19419] __kernfs_create_file+0x45/0x1a0 [ 463.585987][T19419] sysfs_add_file_mode_ns+0x1c1/0x250 [ 463.591384][T19419] internal_create_group+0x2f4/0x860 [ 463.596790][T19419] sysfs_create_group+0x1b/0x20 [ 463.601659][T19419] loop_configure+0xc58/0xf30 [ 463.606416][T19419] lo_ioctl+0x583/0x1270 [ 463.610674][T19419] ? unlock_page+0x37/0x50 [ 463.615138][T19419] ? __rcu_read_unlock+0x5c/0x290 [ 463.620179][T19419] ? blkdev_common_ioctl+0x438/0x1120 [ 463.625640][T19419] ? do_vfs_ioctl+0x819/0x14a0 [ 463.630512][T19419] ? lo_release+0x120/0x120 [ 463.635019][T19419] blkdev_ioctl+0x20e/0x440 [ 463.639627][T19419] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 463.645103][T19419] __se_sys_ioctl+0xcb/0x140 [ 463.649876][T19419] __x64_sys_ioctl+0x3f/0x50 [ 463.654487][T19419] do_syscall_64+0x44/0xa0 [ 463.658915][T19419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 463.664912][T19419] RIP: 0033:0x7f41f34498a7 [ 463.669334][T19419] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 463.688953][T19419] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 463.697622][T19419] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 463.705646][T19419] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 463.713684][T19419] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 463.721697][T19419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 12:39:25 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:25 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:25 executing program 0: sendto(0xffffffffffffffff, &(0x7f0000000000)="7d84ea4cf7c59051da39a47c90e960128fd6c13fd77a2f33e845223f2b284363799acdab5c2e76a57c1f803c902896968e602998d7063a485a051fa9a17d0450a5bad3bc2d6f61", 0x47, 0x11, &(0x7f0000000080)=@qipcrtr={0x2a, 0x2, 0xffffbffd}, 0x80) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000300)={0x34, r3, 0x301, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x1c, 0x2, 0x0, 0x1, [{0x5, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000002140)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002100)={&(0x7f0000001ec0)={0x224, r3, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x204, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x97, 0x5, "e38edbcb9fa2e3b2d1d816732405f6e774e6b1f7be8391f62d1123a37a610c245bc563f916ebfb230c86cc8febcc764cfa7c62c3a26e6bc06bc1ee85539d8184e8051533cc67ac428f2c17f50a4bdd1d494a5c31f5e0117da8abbf8c9ce6bdf001aa43e1767633ba331518473de6943f01188f53d513764e64c0e01598dabe4e8ef3797ef3053faa9000b9ac3516cc73aac880"}, @ETHTOOL_A_BITSET_BITS={0x15c, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5079}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%w-,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf75f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '(]\xb2[(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff0000}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffeff}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/loop#\x00'}]}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0x4}, 0x20004840) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) recvmmsg(0xffffffffffffffff, &(0x7f0000001e00)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/58, 0x3a}], 0x1, &(0x7f0000000240)=""/207, 0xcf}, 0xffff}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000000440)=""/252, 0xfc}], 0x3, &(0x7f0000000580)=""/145, 0x91}}, {{&(0x7f0000000640)=@caif, 0x80, &(0x7f0000001cc0)=[{&(0x7f00000006c0)=""/74, 0x4a}, {&(0x7f0000000740)}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/148, 0x94}, {&(0x7f0000001840)=""/204, 0xcc}, {&(0x7f0000001940)=""/234, 0xea}, {&(0x7f0000001a40)=""/85, 0x55}, {&(0x7f0000001ac0)=""/35, 0x23}, {&(0x7f0000001b00)=""/138, 0x8a}, {&(0x7f0000001bc0)=""/248, 0xf8}], 0xa, &(0x7f0000001d80)=""/75, 0x4b}, 0x8}], 0x3, 0x1, 0x0) sendfile(r4, r4, 0x0, 0x3) [ 463.729676][T19419] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 463.737867][T19419] loop3: detected capacity change from 0 to 4 [ 463.762596][T19424] loop2: detected capacity change from 0 to 4 [ 463.769754][T19424] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 463.777456][T19425] loop1: detected capacity change from 0 to 1054 12:39:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000000)) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) [ 463.779365][T19419] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 463.795316][T19424] loop2: detected capacity change from 0 to 4 [ 463.801899][T19425] EXT4-fs (loop1): bad geometry: block count 1024 exceeds size of device (527 blocks) 12:39:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r2, 0x8e92c000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x800000000000, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendfile(r0, r1, 0x0, 0x10000) 12:39:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000d0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:25 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000404000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 463.833847][T19433] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 30) 12:39:25 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000280)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="8ed4cfc555c522b56c33c103c1d055369aa254104b564fa01db6b92ca4f76d59759e1ebef976285d14769361997aaebaf1e4ff0eb247307aaf8ec00977a1a0fe3694cd0b24aba00a7debe0df4ca25959ef7cc2b6fbb738d23234be1676c623e0d4d3f7e2e0b8728d577dc23a56a60b4d178d9cde820f84896fbff38be1748696f4c30c6c2b", 0x85, 0x400c044, &(0x7f00000000c0)={0xa, 0x4e22, 0x1, @mcast1, 0x9}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000100)={0x1d, 0x14, '\x00', [@pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x80, 0x98, "e90ee90315453b83f2e524f2598733570936b06f9b2536d9b296cd913153f88867cbdab471bebcea1ad5ecbfd5ce6d0a5d56c7a305df5c7276b9ebd014a8dc7e2be01249a541eb7cfffad65723d53248d2187dde8856521929c67cea84aa90d749a9d165ca3d8f142474d3431bb793fe75f91ee402776fa0432dda19055fb54b39b64a69f3651cb67459697487546f1f44e6c203a40b7fcf"}]}, 0xb0) recvmmsg(0xffffffffffffffff, &(0x7f0000005500)=[{{&(0x7f0000000200)=@nl=@proc, 0x80, &(0x7f0000000280)}, 0x3ff}, {{&(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000015c0)}, 0x634e}, {{&(0x7f0000001640)=@ax25={{0x3, @rose}, [@netrom, @null, @null, @rose, @bcast, @default, @default]}, 0x80, &(0x7f0000001700)=[{&(0x7f00000016c0)=""/35, 0x23}], 0x1, &(0x7f0000001740)=""/123, 0x7b}, 0x1}, {{&(0x7f00000017c0)=@ax25={{0x3, @bcast}, [@rose, @default, @rose, @default, @netrom, @rose, @default, @rose]}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001840)=""/107, 0x6b}], 0x1, &(0x7f0000001900)=""/200, 0xc8}, 0x7}, {{&(0x7f0000001a00)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003c40), 0x0, &(0x7f0000003cc0)=""/148, 0x94}, 0x6}, {{&(0x7f0000003d80)=@ax25={{0x3, @rose}, [@netrom, @bcast, @netrom, @null, @default, @default, @default, @rose]}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003e00)=""/101, 0x65}, {&(0x7f0000003e80)=""/195, 0xc3}, {&(0x7f0000003f80)}, {&(0x7f0000003fc0)=""/218, 0xda}, {&(0x7f00000040c0)=""/231, 0xe7}], 0x5, &(0x7f0000004240)=""/182, 0xb6}, 0x1}, {{&(0x7f0000004300), 0x80, &(0x7f0000005480)=[{&(0x7f0000004380)}, {&(0x7f00000043c0)=""/142, 0x8e}, {&(0x7f0000004480)=""/4096, 0x1000}], 0x3, &(0x7f00000054c0)=""/29, 0x1d}, 0x401}], 0x7, 0x2000, &(0x7f00000056c0)={0x0, 0x3938700}) recvfrom$inet6(r1, &(0x7f0000005700)=""/22, 0x16, 0x61, &(0x7f0000005740)={0xa, 0x4e23, 0x0, @private0, 0x6}, 0x1c) [ 463.913335][T19442] loop1: detected capacity change from 0 to 1054 [ 463.913661][T19443] FAULT_INJECTION: forcing a failure. [ 463.913661][T19443] name failslab, interval 1, probability 0, space 0, times 0 [ 463.931744][T19442] EXT4-fs (loop1): bad geometry: block count 1028 exceeds size of device (527 blocks) [ 463.932310][T19443] CPU: 0 PID: 19443 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 463.950226][T19443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.960317][T19443] Call Trace: 12:39:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x32357b63a312e388, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x5) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r2, r1, &(0x7f00000000c0)=0x1, 0x4) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000080)) sendfile(r0, r0, 0x0, 0x3) [ 463.961654][T19439] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 463.963599][T19443] dump_stack_lvl+0xd6/0x122 [ 463.963633][T19443] dump_stack+0x11/0x1b [ 463.985331][T19443] should_fail+0x23c/0x250 [ 463.989827][T19443] ? __kernfs_new_node+0x6a/0x340 [ 463.994866][T19443] __should_failslab+0x81/0x90 [ 463.999679][T19443] should_failslab+0x5/0x20 [ 464.004278][T19443] kmem_cache_alloc+0x4f/0x320 [ 464.009072][T19443] ? __down_write_common+0x42/0x860 [ 464.014375][T19443] __kernfs_new_node+0x6a/0x340 [ 464.019279][T19443] ? up_write+0x25/0xc0 [ 464.023467][T19443] kernfs_new_node+0x5b/0xd0 [ 464.028075][T19443] __kernfs_create_file+0x45/0x1a0 [ 464.033219][T19443] sysfs_add_file_mode_ns+0x1c1/0x250 [ 464.038652][T19443] internal_create_group+0x2f4/0x860 [ 464.043965][T19443] sysfs_create_group+0x1b/0x20 [ 464.049006][T19443] loop_configure+0xc58/0xf30 [ 464.053701][T19443] lo_ioctl+0x583/0x1270 [ 464.058000][T19443] ? unlock_page+0x37/0x50 [ 464.062426][T19443] ? __rcu_read_unlock+0x5c/0x290 [ 464.067534][T19443] ? blkdev_common_ioctl+0x438/0x1120 [ 464.073048][T19443] ? do_vfs_ioctl+0x819/0x14a0 [ 464.077874][T19443] ? lo_release+0x120/0x120 [ 464.082559][T19443] blkdev_ioctl+0x20e/0x440 [ 464.087120][T19443] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 464.092618][T19443] __se_sys_ioctl+0xcb/0x140 [ 464.097313][T19443] __x64_sys_ioctl+0x3f/0x50 [ 464.101961][T19443] do_syscall_64+0x44/0xa0 [ 464.106400][T19443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 464.112381][T19443] RIP: 0033:0x7f41f34498a7 [ 464.116793][T19443] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 464.136523][T19443] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.144953][T19443] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 464.152980][T19443] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 464.160949][T19443] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 464.168935][T19443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 464.177120][T19443] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 464.185228][T19443] loop3: detected capacity change from 0 to 4 [ 464.192153][T19443] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 464.204182][T19452] loop2: detected capacity change from 0 to 4 [ 464.212003][T19452] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 464.236729][T19452] loop2: detected capacity change from 0 to 4 [ 464.243208][T19452] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r1) getdents64(r1, 0x0, 0x2000) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x2, 0x0, 0x1e, 0x14, "d05dffb7cb640c0984c60eb7bbcfa009e9427500595506fc25c9a63a414e6448cddc78e95c713af6eef2df577f9f9d19b6d037900df12e61d848ba5adeca977a", "fdc024e6a7dbed3ca8b855d93b8bd9b22992e156c10d53971bfcff5427a1e329", [0xec75, 0xffffffff]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x59, 0xa, 0xb, 0x1e8369d7e1bcde64, "7cd267c916033e9b2a84627303ffe9257712afb4d7fe82b39bfe2290d066a8a6d09f846cc95bbb615b8dcc6d2a206acb6d02a526f1e63b49d15ce539026299fe", "59000a7b27793aabee80ecaf78c30db4cfa21d916a233e51de37f846391b2e36", [0x1, 0x7ff]}) 12:39:26 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000005000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 31) 12:39:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000e0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 464.624368][T19458] loop1: detected capacity change from 0 to 1054 [ 464.641047][T19460] loop2: detected capacity change from 0 to 4 [ 464.648001][T19460] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 464.657733][T19463] FAULT_INJECTION: forcing a failure. [ 464.657733][T19463] name failslab, interval 1, probability 0, space 0, times 0 [ 464.665610][T19458] EXT4-fs (loop1): bad geometry: block count 1280 exceeds size of device (527 blocks) [ 464.670439][T19463] CPU: 1 PID: 19463 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 464.688403][T19463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.698466][T19463] Call Trace: [ 464.701747][T19463] dump_stack_lvl+0xd6/0x122 [ 464.706374][T19463] dump_stack+0x11/0x1b [ 464.710556][T19463] should_fail+0x23c/0x250 [ 464.714980][T19463] ? __kernfs_new_node+0x6a/0x340 [ 464.720154][T19463] __should_failslab+0x81/0x90 [ 464.724964][T19463] should_failslab+0x5/0x20 [ 464.729494][T19463] kmem_cache_alloc+0x4f/0x320 [ 464.734272][T19463] ? __down_write_common+0x42/0x860 [ 464.739485][T19463] __kernfs_new_node+0x6a/0x340 [ 464.740578][T19464] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 464.744382][T19463] ? up_write+0x25/0xc0 [ 464.744408][T19463] kernfs_new_node+0x5b/0xd0 [ 464.744433][T19463] __kernfs_create_file+0x45/0x1a0 [ 464.771201][T19463] sysfs_add_file_mode_ns+0x1c1/0x250 [ 464.776585][T19463] internal_create_group+0x2f4/0x860 [ 464.781956][T19463] sysfs_create_group+0x1b/0x20 [ 464.786896][T19463] loop_configure+0xc58/0xf30 [ 464.791610][T19463] lo_ioctl+0x583/0x1270 [ 464.795860][T19463] ? unlock_page+0x37/0x50 [ 464.800282][T19463] ? __rcu_read_unlock+0x5c/0x290 [ 464.805349][T19463] ? blkdev_common_ioctl+0x438/0x1120 [ 464.810842][T19463] ? do_vfs_ioctl+0x819/0x14a0 [ 464.815616][T19463] ? lo_release+0x120/0x120 [ 464.820118][T19463] blkdev_ioctl+0x20e/0x440 [ 464.824702][T19463] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 464.830169][T19463] __se_sys_ioctl+0xcb/0x140 [ 464.834772][T19463] __x64_sys_ioctl+0x3f/0x50 [ 464.839423][T19463] do_syscall_64+0x44/0xa0 [ 464.843910][T19463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 464.849927][T19463] RIP: 0033:0x7f41f34498a7 [ 464.854362][T19463] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 464.874070][T19463] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 464.882489][T19463] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 464.890511][T19463] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 464.898480][T19463] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 464.906482][T19463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 464.914454][T19463] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 12:39:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6a084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x81, 0x7, 0xf7, 0x9, 0x0, 0x10000, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1d, 0x2, @perf_config_ext={0x4, 0x7}, 0x4002, 0xce67, 0x2, 0x2, 0x3, 0xf3, 0x5, 0x0, 0x58, 0x0, 0x1}, r3, 0xd, r2, 0x3) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(r5, 0x82307201, &(0x7f0000000800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) [ 464.922489][T19463] loop3: detected capacity change from 0 to 4 [ 464.929726][T19463] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 464.942081][T19460] loop2: detected capacity change from 0 to 4 [ 464.963696][T19460] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000f0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:26 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000ffe0f505000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:26 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x8) [ 465.040727][T19472] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 465.054500][T19476] loop2: detected capacity change from 0 to 4 [ 465.061962][T19476] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 465.077489][T19477] loop1: detected capacity change from 0 to 1054 12:39:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 32) 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) clone3(&(0x7f0000000240)={0x4000000, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), {0x1d}, &(0x7f00000000c0)=""/61, 0x3d, &(0x7f0000000100)=""/187, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000002c0)={{0x0, 0xffffffff, 0x80000000, 0x4, 0x0, 0x1, 0x5, 0x3, 0x0, 0x3, 0x8, 0x1, 0x8, 0xffffffffffffffff, 0x80000000}}) [ 465.089582][T19477] EXT4-fs (loop1): bad geometry: block count 1525 exceeds size of device (527 blocks) [ 465.109765][T19476] loop2: detected capacity change from 0 to 4 [ 465.116529][T19476] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 465.127206][T19484] FAULT_INJECTION: forcing a failure. [ 465.127206][T19484] name failslab, interval 1, probability 0, space 0, times 0 [ 465.139945][T19484] CPU: 1 PID: 19484 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 465.148389][T19484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.158596][T19484] Call Trace: [ 465.161878][T19484] dump_stack_lvl+0xd6/0x122 [ 465.166518][T19484] dump_stack+0x11/0x1b [ 465.170787][T19484] should_fail+0x23c/0x250 [ 465.175214][T19484] ? __kernfs_new_node+0x6a/0x340 [ 465.180270][T19484] __should_failslab+0x81/0x90 [ 465.185064][T19484] should_failslab+0x5/0x20 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x480000) sendfile(r0, r0, 0x0, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x509080, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000100)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000000)={r0, 0xfffffffffffffff8, 0x3, 0x80000001}) 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x6, 0x3, 0x19, 0x1, "a4db294cbdd631067f404b8cf4d63ed0c1054e0fea7b3d97dc89031c20fc163b2743298612d330e157e804f457957a2b386836d58c0171ae2da7fc212ea38588", "5d874f49f97f81f77b71a73eb4a5d8ab182bf7cba20e8472ce199300b9c58c9a", [0x7, 0x1]}) syz_io_uring_setup(0x884, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x20a9, &(0x7f0000000180), &(0x7f00006d7000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000200)) syz_io_uring_submit(0x0, r1, &(0x7f0000000240)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x0) r3 = syz_io_uring_setup(0x187, &(0x7f0000000340), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000540), &(0x7f0000000100)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180), 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) syz_io_uring_submit(r2, r1, &(0x7f0000000280)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x99a, r4}}, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000140)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x80, 0x3, &(0x7f00000000c0)="91b12ca91439788ac53ebf19d132aaddd9bc145f0090e00dcb31ab4e0bf9dd89c6f2ed24ffb6406cf4720eafc9e666dfbd92a1ce3b3bfdec7ec348ae8ba3b3a45f28c0e90562117b4817f21d3efc91ff00366a423776a373e8cc4ae7b10783", 0x0, 0x0, 0x1, {0x1}}, 0x3) sendfile(r0, r0, 0x0, 0x3) [ 465.189579][T19484] kmem_cache_alloc+0x4f/0x320 [ 465.194356][T19484] ? __down_write_common+0x42/0x860 [ 465.199581][T19484] __kernfs_new_node+0x6a/0x340 [ 465.204560][T19484] ? up_write+0x25/0xc0 [ 465.208730][T19484] kernfs_new_node+0x5b/0xd0 [ 465.213403][T19484] __kernfs_create_file+0x45/0x1a0 [ 465.218528][T19484] sysfs_add_file_mode_ns+0x1c1/0x250 [ 465.223920][T19484] internal_create_group+0x2f4/0x860 [ 465.229230][T19484] sysfs_create_group+0x1b/0x20 [ 465.234216][T19484] loop_configure+0xc58/0xf30 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x600381, 0x60) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x1f, 0xff, 0x0, 0x0, 0x4, 0x8402, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xff0, 0xff}, 0x1000, 0x3, 0x3, 0x7, 0x20, 0x4, 0x6, 0x0, 0x1, 0x0, 0x100}, 0x0, 0x10, r1, 0x2) sendfile(r0, r0, 0x0, 0x3) 12:39:26 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x40200) sendfile(r0, r0, 0x0, 0x3) [ 465.238905][T19484] lo_ioctl+0x583/0x1270 [ 465.243148][T19484] ? unlock_page+0x37/0x50 [ 465.247580][T19484] ? __rcu_read_unlock+0x5c/0x290 [ 465.252768][T19484] ? blkdev_common_ioctl+0x438/0x1120 [ 465.258155][T19484] ? do_vfs_ioctl+0x819/0x14a0 [ 465.263014][T19484] ? lo_release+0x120/0x120 [ 465.267580][T19484] blkdev_ioctl+0x20e/0x440 [ 465.272099][T19484] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 465.277574][T19484] __se_sys_ioctl+0xcb/0x140 [ 465.282201][T19484] __x64_sys_ioctl+0x3f/0x50 [ 465.286827][T19484] do_syscall_64+0x44/0xa0 [ 465.291302][T19484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 465.297209][T19484] RIP: 0033:0x7f41f34498a7 [ 465.301756][T19484] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 465.321478][T19484] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 465.329903][T19484] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 465.337869][T19484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 465.345991][T19484] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 465.354098][T19484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 465.362274][T19484] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 465.370315][T19484] loop3: detected capacity change from 0 to 4 [ 465.377369][T19484] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:39:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:27 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000006000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000104100c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="7c3a7b107922e2dd6fdb08cf464ac903f32a4381dfbefb11def18ef4df9ffe8f35ef2c213652e7498a6b720d678e61a46d28bbb152e37b32e33300ab8826043f59e347ce73862042edba523c004ec870f4100245dd47f8c83cbb76c894d4df9cc7ff0469b13a51fc9600a1c51de6bfc197bef47f8bbcc0b7f7e77fb0c4ebd55aa050a59ef9522021096894ab2f795759ea290956a230", 0x96}, {&(0x7f00000000c0)="a10e1700124a29adb82da28b2b7c81da34f2b60323f2a6fd5d456caddf959f73c54dc183dc9a6df7a08ca7621b9faef410ae76b0bba4535fdfe720d544464f3b2860fba2d50aca6aabeac5038967ef55959b3e4921db2023ed4bd734437c2a12467da59c78346bb69a72b562041a48b1bec05d42f0879b6560dc6d7df24c9437fc", 0x81}, {&(0x7f0000000200)="43a724f87cc1dbb9762b6026213496a271574a733596375b18389d6bcef5c2977b7210883177cabde9487a4e506a5c9b98f81db7e3039da9392d1bbc7b0efe47c2e89fd2305836689a75cce711f357fc199afe2e9b0722fb33a9955c66657f75fda55def4687f7cc6a62d3bbb4bc7d8b28145f2855744a0c1b5f3c55cfabc300f938eb294c24c392a2e84a56a8b3d608afbd145ee3375bf251622fb2bcf9140d21e4d7ad7ab1", 0xa6}, {&(0x7f00000002c0)="6106e91b91e56d2cc679cbe19704b0bb1b0e352d8438c9a4f07a54b682397902c3ffc1e79928e947ad14f9be74cd98c3859399a4f88313b536e0544b51021d0c76dc8789a2c44090f2702600e5540460dd5ff6b0ca305d1f3a8a65a70bad3173ede99b92b866226935a94f7a4fcab6b56afe1ed72a9a902b86e7d242404b45ad60dfeedc9cd13b932ead431277127e5371cc85d47f9a3dbf2f745832f47cc08c179cf7c54a544811c6dbc916b138f464ab54be7506d2f6fba8cfee5bbc3d74e37c3300ce74cc0dd6a11385aaf8dadb489c4507bb5f45a490676e437024e8d02d5e4df7a70bac12c9692dfc2c92", 0xed}], 0x4, 0xb2, 0x3800) ioctl$BLKPG(r0, 0x1269, &(0x7f00000003c0)={0x8, 0x9, 0x144, &(0x7f0000000480)="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"}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x80010, r0, 0xee52f000) [ 465.841733][T19489] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 465.889515][T19509] loop1: detected capacity change from 0 to 1054 [ 465.897564][T19507] loop2: detected capacity change from 0 to 4 [ 465.904591][T19507] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 465.922300][T19509] EXT4-fs (loop1): bad geometry: block count 1536 exceeds size of device (527 blocks) 12:39:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 33) 12:39:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x4000000000075f, 0x52440) sendfile(r0, r0, 0x0, 0x3) 12:39:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000120100c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 465.965876][T19514] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 465.991904][T19523] loop3: detected capacity change from 0 to 4 [ 465.998085][T19523] FAULT_INJECTION: forcing a failure. [ 465.998085][T19523] name failslab, interval 1, probability 0, space 0, times 0 [ 466.010719][T19523] CPU: 0 PID: 19523 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 466.019187][T19523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.029631][T19523] Call Trace: [ 466.032915][T19523] dump_stack_lvl+0xd6/0x122 [ 466.037533][T19523] dump_stack+0x11/0x1b [ 466.041734][T19523] should_fail+0x23c/0x250 [ 466.046250][T19523] ? kobject_uevent_env+0x1a7/0xc40 [ 466.051496][T19523] __should_failslab+0x81/0x90 [ 466.056380][T19523] should_failslab+0x5/0x20 [ 466.060954][T19523] kmem_cache_alloc_trace+0x52/0x350 [ 466.066330][T19523] ? _printk+0x76/0x97 [ 466.070557][T19523] ? dev_uevent_filter+0x70/0x70 [ 466.075878][T19523] kobject_uevent_env+0x1a7/0xc40 [ 466.080917][T19523] kobject_uevent+0x18/0x20 [ 466.085478][T19523] loop_configure+0xd70/0xf30 [ 466.090164][T19523] lo_ioctl+0x583/0x1270 [ 466.094432][T19523] ? unlock_page+0x37/0x50 [ 466.098901][T19523] ? __rcu_read_unlock+0x5c/0x290 [ 466.104005][T19523] ? blkdev_common_ioctl+0x438/0x1120 [ 466.109458][T19523] ? do_vfs_ioctl+0x819/0x14a0 [ 466.114306][T19523] ? lo_release+0x120/0x120 [ 466.118811][T19523] blkdev_ioctl+0x20e/0x440 [ 466.123337][T19523] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 466.128931][T19523] __se_sys_ioctl+0xcb/0x140 [ 466.133542][T19523] __x64_sys_ioctl+0x3f/0x50 [ 466.138142][T19523] do_syscall_64+0x44/0xa0 [ 466.142586][T19523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 466.148492][T19523] RIP: 0033:0x7f41f34498a7 [ 466.152913][T19523] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 466.172879][T19523] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.181425][T19523] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 466.189403][T19523] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 466.197405][T19523] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 466.205381][T19523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 12:39:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) write(0xffffffffffffffff, &(0x7f0000000000)="0a14d4d5de59f92c9873da78d362e0ceb5b4b07dbbf8750e4461bb1c6cf08be7e553e620e1278bba0b0405d900cd9fa317170853bacb2c2a3177c57d5d9c50ee957f5d318cec18979f55754b9ed89c34010773aaa82c50b9929ca7ffd1898bfbdace1e3a4c390e29", 0xfffffffffffffe3b) sendfile(r0, r0, 0x0, 0x83) r1 = timerfd_create(0x8, 0x400) dup2(r1, r0) 12:39:27 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000406000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 466.213355][T19523] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 466.236989][T19521] loop2: detected capacity change from 0 to 4 [ 466.243898][T19521] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 466.252516][T19523] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 466.266522][T19521] loop2: detected capacity change from 0 to 4 [ 466.269424][T19529] loop1: detected capacity change from 0 to 1054 [ 466.273536][T19521] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 466.288144][T19529] EXT4-fs (loop1): bad geometry: block count 1540 exceeds size of device (527 blocks) 12:39:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100110c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 34) [ 466.378638][T19533] loop2: detected capacity change from 0 to 4 [ 466.385680][T19533] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 466.417116][T19533] loop2: detected capacity change from 0 to 4 [ 466.423928][T19533] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 466.774858][T19534] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 466.794826][T19537] loop3: detected capacity change from 0 to 4 [ 466.800997][T19537] FAULT_INJECTION: forcing a failure. [ 466.800997][T19537] name failslab, interval 1, probability 0, space 0, times 0 [ 466.813615][T19537] CPU: 1 PID: 19537 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 466.822265][T19537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.832384][T19537] Call Trace: [ 466.835666][T19537] dump_stack_lvl+0xd6/0x122 [ 466.840282][T19537] dump_stack+0x11/0x1b [ 466.844461][T19537] should_fail+0x23c/0x250 [ 466.848898][T19537] ? kobject_uevent_env+0x1a7/0xc40 [ 466.854107][T19537] __should_failslab+0x81/0x90 [ 466.858889][T19537] should_failslab+0x5/0x20 [ 466.863512][T19537] kmem_cache_alloc_trace+0x52/0x350 [ 466.868890][T19537] ? _printk+0x76/0x97 [ 466.872963][T19537] ? dev_uevent_filter+0x70/0x70 [ 466.877910][T19537] kobject_uevent_env+0x1a7/0xc40 [ 466.883014][T19537] kobject_uevent+0x18/0x20 [ 466.887529][T19537] loop_configure+0xd70/0xf30 [ 466.892201][T19537] lo_ioctl+0x583/0x1270 [ 466.896436][T19537] ? unlock_page+0x37/0x50 [ 466.900848][T19537] ? __rcu_read_unlock+0x5c/0x290 [ 466.905928][T19537] ? blkdev_common_ioctl+0x438/0x1120 [ 466.911382][T19537] ? do_vfs_ioctl+0x819/0x14a0 [ 466.916159][T19537] ? lo_release+0x120/0x120 [ 466.920651][T19537] blkdev_ioctl+0x20e/0x440 [ 466.925170][T19537] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 466.930624][T19537] __se_sys_ioctl+0xcb/0x140 [ 466.935260][T19537] __x64_sys_ioctl+0x3f/0x50 [ 466.939903][T19537] do_syscall_64+0x44/0xa0 [ 466.944316][T19537] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 466.950203][T19537] RIP: 0033:0x7f41f34498a7 [ 466.954626][T19537] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 466.974310][T19537] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 466.983008][T19537] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 466.991488][T19537] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 466.999531][T19537] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 467.007491][T19537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 467.015509][T19537] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 12:39:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:28 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100120c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100140c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 467.148549][T19541] loop1: detected capacity change from 0 to 1054 [ 467.163654][T19543] loop2: detected capacity change from 0 to 4 [ 467.170602][T19543] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 467.171835][T19541] EXT4-fs (loop1): bad geometry: block count 1792 exceeds size of device (527 blocks) [ 467.241892][T19547] loop2: detected capacity change from 0 to 4 [ 467.249280][T19547] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000140150c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 467.286995][T19547] loop2: detected capacity change from 0 to 4 [ 467.293634][T19547] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:28 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000008000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 467.363650][T19549] loop1: detected capacity change from 0 to 1054 [ 467.371984][T19551] loop2: detected capacity change from 0 to 4 [ 467.379177][T19551] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 467.402452][T19549] EXT4-fs (loop1): bad geometry: block count 2048 exceeds size of device (527 blocks) 12:39:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100200c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 467.466294][T19554] loop2: detected capacity change from 0 to 4 [ 467.473361][T19554] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000110200c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:28 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000408000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 467.514429][T19537] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 467.528376][T19557] loop2: detected capacity change from 0 to 4 [ 467.535744][T19557] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 35) [ 467.571144][T19559] loop1: detected capacity change from 0 to 1054 [ 467.579715][T19557] loop2: detected capacity change from 0 to 4 [ 467.586226][T19557] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 467.604380][T19559] EXT4-fs (loop1): bad geometry: block count 2052 exceeds size of device (527 blocks) [ 467.648876][T19561] loop3: detected capacity change from 0 to 4 [ 467.655019][T19561] FAULT_INJECTION: forcing a failure. [ 467.655019][T19561] name failslab, interval 1, probability 0, space 0, times 0 [ 467.667707][T19561] CPU: 0 PID: 19561 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 467.676122][T19561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.686184][T19561] Call Trace: [ 467.689547][T19561] dump_stack_lvl+0xd6/0x122 [ 467.694218][T19561] dump_stack+0x11/0x1b [ 467.698397][T19561] should_fail+0x23c/0x250 [ 467.702906][T19561] __should_failslab+0x81/0x90 [ 467.707718][T19561] should_failslab+0x5/0x20 [ 467.712294][T19561] kmem_cache_alloc_node+0x61/0x2d0 [ 467.717522][T19561] ? __alloc_skb+0xed/0x440 [ 467.722114][T19561] __alloc_skb+0xed/0x440 [ 467.726583][T19561] alloc_uevent_skb+0x5b/0x120 [ 467.731458][T19561] kobject_uevent_env+0x863/0xc40 [ 467.736504][T19561] kobject_uevent+0x18/0x20 [ 467.741021][T19561] loop_configure+0xd70/0xf30 [ 467.745710][T19561] lo_ioctl+0x583/0x1270 [ 467.749961][T19561] ? unlock_page+0x37/0x50 [ 467.754394][T19561] ? __rcu_read_unlock+0x5c/0x290 [ 467.759433][T19561] ? blkdev_common_ioctl+0x438/0x1120 [ 467.764825][T19561] ? do_vfs_ioctl+0x819/0x14a0 [ 467.769720][T19561] ? lo_release+0x120/0x120 [ 467.774296][T19561] blkdev_ioctl+0x20e/0x440 [ 467.778864][T19561] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 467.784347][T19561] __se_sys_ioctl+0xcb/0x140 [ 467.788958][T19561] __x64_sys_ioctl+0x3f/0x50 [ 467.793619][T19561] do_syscall_64+0x44/0xa0 [ 467.798060][T19561] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 467.803970][T19561] RIP: 0033:0x7f41f34498a7 [ 467.808394][T19561] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 467.828056][T19561] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 467.836494][T19561] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 12:39:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100220c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 467.844472][T19561] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 467.852454][T19561] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 467.860441][T19561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 467.868424][T19561] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 467.879499][T19563] loop2: detected capacity change from 0 to 4 [ 467.886882][T19563] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:29 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000009000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 467.897054][T19561] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 467.919027][T19565] loop1: detected capacity change from 0 to 1054 [ 467.926871][T19563] loop2: detected capacity change from 0 to 4 [ 467.933415][T19563] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 467.942470][T19565] EXT4-fs (loop1): bad geometry: block count 2304 exceeds size of device (527 blocks) 12:39:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 36) 12:39:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100250c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 468.078894][T19567] loop3: detected capacity change from 0 to 4 [ 468.085043][T19567] FAULT_INJECTION: forcing a failure. [ 468.085043][T19567] name failslab, interval 1, probability 0, space 0, times 0 [ 468.097698][T19567] CPU: 1 PID: 19567 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 468.106396][T19567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.116461][T19567] Call Trace: [ 468.119819][T19567] dump_stack_lvl+0xd6/0x122 [ 468.124520][T19567] dump_stack+0x11/0x1b 12:39:29 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 468.128765][T19567] should_fail+0x23c/0x250 [ 468.133276][T19567] __should_failslab+0x81/0x90 [ 468.138100][T19567] should_failslab+0x5/0x20 [ 468.142703][T19567] kmem_cache_alloc_node_trace+0x61/0x310 [ 468.148500][T19567] ? __kmalloc_node_track_caller+0x30/0x40 [ 468.154330][T19567] __kmalloc_node_track_caller+0x30/0x40 [ 468.160185][T19567] ? alloc_uevent_skb+0x5b/0x120 [ 468.165137][T19567] __alloc_skb+0x1a1/0x440 [ 468.169573][T19567] alloc_uevent_skb+0x5b/0x120 [ 468.174371][T19567] kobject_uevent_env+0x863/0xc40 [ 468.179411][T19567] kobject_uevent+0x18/0x20 [ 468.183924][T19567] loop_configure+0xd70/0xf30 [ 468.188617][T19567] lo_ioctl+0x583/0x1270 [ 468.192920][T19567] ? unlock_page+0x37/0x50 [ 468.197351][T19567] ? __rcu_read_unlock+0x5c/0x290 [ 468.202522][T19567] ? blkdev_common_ioctl+0x438/0x1120 [ 468.207919][T19567] ? do_vfs_ioctl+0x819/0x14a0 [ 468.212714][T19567] ? lo_release+0x120/0x120 [ 468.217228][T19567] blkdev_ioctl+0x20e/0x440 [ 468.221746][T19567] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 468.227248][T19567] __se_sys_ioctl+0xcb/0x140 [ 468.231905][T19567] __x64_sys_ioctl+0x3f/0x50 [ 468.236548][T19567] do_syscall_64+0x44/0xa0 [ 468.241001][T19567] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 468.246906][T19567] RIP: 0033:0x7f41f34498a7 [ 468.251328][T19567] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 468.271036][T19567] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.279545][T19567] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 468.287528][T19567] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 468.295544][T19567] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 468.303530][T19567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 468.311550][T19567] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 468.320449][T19571] loop1: detected capacity change from 0 to 1054 [ 468.338427][T19575] loop2: detected capacity change from 0 to 4 [ 468.343562][T19571] EXT4-fs (loop1): bad geometry: block count 2560 exceeds size of device (527 blocks) [ 468.354497][T19575] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:29 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000040a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:29 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100280c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 468.456339][T19578] loop1: detected capacity change from 0 to 1054 [ 468.481283][T19582] loop2: detected capacity change from 0 to 4 [ 468.488150][T19582] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001002e0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 468.508569][T19578] EXT4-fs (loop1): bad geometry: block count 2564 exceeds size of device (527 blocks) 12:39:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000b000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 468.574615][T19586] loop2: detected capacity change from 0 to 4 [ 468.581677][T19586] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 468.621203][T19567] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 468.623989][T19588] loop1: detected capacity change from 0 to 1054 [ 468.639360][T19588] EXT4-fs (loop1): bad geometry: block count 2816 exceeds size of device (527 blocks) [ 468.652015][T19586] loop2: detected capacity change from 0 to 4 [ 468.658870][T19586] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001003f0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 37) [ 468.734895][T19590] loop2: detected capacity change from 0 to 4 [ 468.741930][T19590] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 468.750859][T19592] loop3: detected capacity change from 0 to 4 [ 468.757025][T19592] FAULT_INJECTION: forcing a failure. [ 468.757025][T19592] name failslab, interval 1, probability 0, space 0, times 0 [ 468.769653][T19592] CPU: 0 PID: 19592 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 468.778072][T19592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.788136][T19592] Call Trace: [ 468.791422][T19592] dump_stack_lvl+0xd6/0x122 [ 468.796130][T19592] dump_stack+0x11/0x1b [ 468.800309][T19592] should_fail+0x23c/0x250 [ 468.804774][T19592] ? skb_clone+0x12c/0x1f0 [ 468.809204][T19592] __should_failslab+0x81/0x90 [ 468.814001][T19592] should_failslab+0x5/0x20 [ 468.818585][T19592] kmem_cache_alloc+0x4f/0x320 [ 468.823376][T19592] skb_clone+0x12c/0x1f0 [ 468.827636][T19592] netlink_broadcast_filtered+0x4fd/0xb60 12:39:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x8e1) sendfile(r0, r0, 0x0, 0x3) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xe, 0x30, r0, 0xdf0f6000) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004da80)={0x0, 0x0, "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", "eee645b186feb4b616b8889e6e7a747d9320333bdb0d92423e4bb9354100da97f66a1593308307d6637df65ebc6036aa4f92c94f5ae42bb1c0610a6b62a5a785038bd3080abd600a0af22bdcf3fadc3216a626ee53e76a3263bb512cd1596a8cb9c991499b0989cf97484df8b1d7fd575f60565c82c11a7a4b22452e73627b6e029d22bc7ad752d76717d17bb77b79c310f4aeb48a4361b9dbdac1f8b4a9a86b12ba93f09d9b044551b85b5d78d2ad85ba7bebf7e733e4f722bf9eb8ddc21a99db3e74ac3d1eb94efa1f9f5c5ed0ad2460ac6db89103e8bdf56e4448393569c93a75ce0a585acd3ab82c542ba3db02dd16ce2ebbeb845dd347011c5e4112f8f43378c8af58e686e139d8798614847419bb6f74012168e34c8d3473141c8a2ceed37553c4c054757b3485ba5a22bce356bc3a0dea359e872a6afe7903f4ef1f3017c69638d87330189549265696bd8846182e03dc68123626a9ad8645220923742e0add901642fc99abf816c576900a9d44f65a50606ae17cb92e2dc263a6b5d5ea2164a7e2bb3cefe869723904a0c6aad3f2ef60fd1ea07c65591d76c285e6f1e5a0b6ab0d393ab85dd75cf21d32a3a4eb7b365cd94308e7221ad96c81b3bd6b70ac9410495e4d3ad10db7d803c57c8111f000b58a020f40e403299e43b8984b99025d1e5ae7a9e735db8064f1b2c538388dec8d81b6a9eb16f955d7a0c3706157696f21b4ce76a36f075b013923603fd2a258ea18a235448cd0d51d496b4387546c6aeff920ea7283de02b50b77893219f7ac608e2d3a6efd1d1cc534b0c69c20ed9ff263e88653c52a4eca84e4b8d81d607ba5bc5b20c5889d8c5e8d06ac762c5ddf89da1dc84ddf324cf4bf9786b6946145b89ea8853be4642e58c650280008598a8ad3674044faaf8dea229a500468b470be8b0d6cfd50f2d5d5dfab25ca36a6fbf91d5e28aa6e903510719eb8fd980c8f0993776c9e73ae042d4c87be5c6d7dc4d26563129f306f128a447f0b1dcbc60917d264d8995c163c2a3a7e337e1f33ac7a8cddda7658b57fe01abd7ba84048b6e761bca085c1f7d3350d9a1dd8f3cb7e892886fcfba47157cdaa4d492adc4260575498c699630dbf38c454bc3b7d464e9608d1f02f632b2c34edf68fa333c124fcf3e2dedfe1c7273beb7541c3a8e80205ba5c67f39b5248bfa0378edc6a4fa98b77c0bccd54e28890dc7dd8eb50e510d38c423d5a9e0224a0e2012067e5a15f01f1bd6955825347687fec865a2ce826060d1323b9c19fbf5014a9a6e53a1643bf295b91aa4373b381d942cb68cbffec4931bb25024677496b9367f23df93982630b5485d258f5d658199412e607759da64b901017968a747abe56250252c8ce253c46e0cbce5e317631fa54f63e2f6decd30e54c002cf5040ca002906700e93aa982d593fd0752c426601ae6149f6f3c4219c75fe5c1de9f067b03e09532a2858cc316e1e157dded88167b9b9d77153aab6a1d297a61ae5c3fe40d5cd2b7dfcd9981812d5338cca70ec854229a591e07fe49cc913ba622c18eeb1ad7951957684bb64487dedf02ae9831098e545da705d5aee632bd4b0e3c2b33dbcab8ea9d02876c187c92a73206d0b258974d450905922dc30ed34840853df081f9f52d949b533478121d6dd64f300da46c7d2da09a6a8afae56d5923e3865921ae8c946a4a9a45281aea0d2d5d7723fde1e9bd9c25d80d3a26405a4e996efa04ba7474d2e3b4fd0cbf57cc4e33acae6562e5bdc53a28d7c8bda7b5b48541182ffbcabafedf8f9400ca4b3d8a42fecf0cb5fad6c08b109c1d7c8d006869de11efe466dd8ff873b8e3ae9ac604b3578260dac8718fc8dbbdfd19e8d280823588d858480e089250f8e3a2faee344204232bef500d8f889b6738f6b8bb36de52d682e82715c79423c85228b0b8e973ab20b89a145cf1f9f0ab75fecef44bdd437cd3b7528a631c5f52088c63994e9a7166f783af2dc3fd9fa67f1ebf557a70d649ac9bd36f94d843b00bb12b55bc0f3c820cbc78854de03119a3a1c731f9d042b8eb7b0167b668066647d02395e221bb53e7e6aced91a30ece2ac20b1c472b8d892a7c4bffbdab41aea2924b74c0c698375fb78906d533b4e738a8c953b15f8e471cb91449f9c7cfd1e27ce4e2fdc2196dcebcabc98f81fb41f42521bfd433897de2ec5982fcf14068e9330bda65ea032f40406bc0b7f4b174ca5d17421db098b9e296074553e39d49baaa0fcbf9f391dac84c4b4edcd5c34634f3dfeff230f216b382f03948390b610b25fe0b7f5d4e6dbc9777965209adeb1837ea8f57fffebf115ddcb6e27ebd178d57569cd1d3f3cf08612e77b51e767c8b82fe11f57e7e7ec3da4b8eeb6d8f10c3c2477c0c79493a6c36f4e1678312105147674e173aea5769a1c5cffd89a685918280c9d082015c474fd8a87d9c06fca9051b21c20d55872ea0c149f0190f273acd793d1327ede62067b145055fc904bd85da9c09fec71a2154d51d9228783cf94616af92f15d32a399d6b4d45452cab75fc608c6742b4b1c5b41161419d7136cee225f1d4b67775fcc99e5b8c50e8a8f299d5a73d4e417e9b4c53ea46ce1ce3422295575ca6efe2cd853dc8f7cbb65f7526fb4414b0bb1d692f74a2e6c79c40080315a32e0fffeccbe59b0c458c528ed982656754d6f3e422375079ec5c28189a30dff42af826f89d9cf5c8fbe3cba217639e71f175ccc17506f370a16076a2f86612263f9919a6e13e7db0776c4b8077c7d8e5a5f5fcc12934cbc758b5b643901f050c1c26ba2e17e0ec7b9ee351c846076cca713fed50399ca3bc4dcfe0f791c9e69bc43745d0addce95378fbf7e35ea12e3bdf9618a71f3d7461d591fc4c5e8db969b4680d3d6a9ea230dc3422bdec078007fe5aa48adb5019d2ceacaaa9adae5a83a71c80321c948e2c922d801e5680a698aaad481f39bcc57910a73b11cdaae6e111c0c43cf72bbaa7269441a66fd75eab504117ba741124da45f4eade2ec455d866aa8da6e825c76cc19ae6de93240159dbc5ee2db164156b204c1ae5be9729c40787caf8ebde42cfc504a9cee90e51bbfdb6964f5912f23302d07e754313233dab0e21508529f4c0ccd6c4c6dff6653535600552d6e5d200412e7dfde0587fceb98bd1c639a399ec6236663ac23914840c0718d00be24e1467705b273dafd58909ad3074622118f5a3b497992672e83d83ac23837565cb9f2c6a083408d662f6d0733ddc166e53ed93f69611c3d26f2d1859dea75ac79d7aca458e3ae5f9a48927141e198865d8f2923e763afa60cb7b58ff8f6a3e30338fbc84a12cf5ea51d916890f4f9b4d0d1a76a0f3136f766a85ce8262da8a4804dc2fa964d508d9d18dc0236c5158e05f6a1f71a05fda8f50bc1b1a5c525bfa87090a33d1b5c1b816d50f533beaf750c0a2bc08f40d7f933e6613480566443fc8899de1e7ecf17f66ad61ed9963d496dbe9ffb830f49c3f5837ed662c8b80f9cbda876917cdcaf5999445354cd13872f1188c93bc568046bfd4a4ad70f3fe891d86488b4f016aa22d3f7c3200b66c01ab4af73312738bdb21c6fed66ea57b5692ba561a578fff399827d79c5204c1f216430c77eb80fbe0bb07ebcc346710e235aca24a392730c8df8b53d387f58847433c5d1c0dd44252c316c8156458b62c2125c273360703e1fb8fb29ed03c472884ab8bb467ffce2326316f2e302e8c0fafe2ac73ec51a129e01feedbc0cc782c79e111516650dd88e0d0e865ae47a172b22e16ca1a4d0e3512f7d99c4d78e6e92619378a5127356850c082587274a7bdc9d049f81ac2b765755026d785fc91fee6ee1dde8856c44f2ab6ef79a80d75f87020dee9965eb8f117bee27b0d14b148668c756e48aaf1cb4e755a3363fe354ddd1164a6797aeda90bc75b6fa55bd14159e28af259390fbc5d2bf6138159c85f35ad1a75a95686ae19ccd52027f4ce70165f901ae03686656ecd87dcef29e993f358718975cbd97bae7592bd936d0aaace98e30984fc61454ceb936ba393d8d65babacb9444a8417dbcdc3f98ac77acf21c5da590c5d7aec1e7f3bd52145a212c7b01694e870d5301af6a4ad0b479de0fd43d94384b0241056f978cc831b9416a743269f8b4c49811108e4077e36ac7965446d8d0415addab06bf769068ca81a79e29dd8b746118741674992a70dc2b5d83f703c0b8a3922eb44d289b1104596db159781b4903095ddebda5bca01edd5628f917e4971ed09ae33d93ece680e385171c04623096307a05ec8951e5b4ef5f09a1a59b3f90e2c0f1e1061d5ea9a9acaf6c471de4bb8766abf19907655f0a44934654a6a4595dee6073301aba7ee994a9dc8a7e7ab2b20fab403d4ae279bdbac7fec2ddff512994f532203b091f728301623320aef9e8f85c81e94221094832152debf2ccf26a5dedaa4329e051d0c8977e031e90c961213f61b8edae238b855d3270114e450913706c3d9141c2ad28d9f8d136ab478039caacc00c10b62d75205603473cd9f0d98da1e48603562ce9f27b8a39508f6a9696209c7a54eb42cc5049704d7856a37b8b0967ac0341d729784b25d8eacb31941d91f93552a3dbf78ec67fed291191165c55188a26b73a004795aabcc57a6000188cf27b6b451355188fb116d5871b4c823b63b0ac61818c53992341b6b5e847c36f6955e67e88189e7d54cc8a29ae32c5938c19eec4e60c4271dfca92337ad9dc98240165def5526bf0b1052d9767a9555e866d3e37579ed112665a8cd9f1d60aac2c85e82d2500abb097d6b1aabfcba7bdb9feeea6fca303cc88715b37e3f72b3facb276c75336b1a92c068707205e09bd30bb7c4762b11c65d9dcded5fff07cac356461fc6f86b70a9120fcbfac4ef301570949ae2bd82ffbea47ff8e57bdb5cd4a810da0484947981c4000ff41528a5382b0d48617cdddc987f74adb5842e5c5da1c25e151ab570c7360db2bd0912b9a5a2afea40e4039f8cf24b1c132b1949cdd0bf4fe5d8e471075ec17a31576bf8f1d6b35fcfca18ee60b3587fe0b21b12b55e49cc7bf05736769ebf548d49c84fbfa7a6a4fdc49721698addf83778cf07b503c28bc2b1f055a6666d972ce5e0770750a9259541c6e6062f1ab5e117d95eea07c122d96513076ad95eb6f9af3b700c98b2f81d9c47ce2ce7c8249016bbd40c52f5de8fb8fe968632ccaa926447a5b5a6721606c0d133c1796c94906cb9e3708132539f23abfdf43d93df86ae5329cd74e73e47f70f8ea2b301ae5a7f8d0dc43780291d030f60beeb73a69dc3557f8f72ad2de68dfb74ab6bd19722070b4433130d4601b65004ddad63c53eed8af13572bdec30a2ba438331eb86b559b3dfba67ae11c192e963d300c0ea29ab0637922d05221e84"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004ea80)={0x0, 0x0, "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", "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"}) r8 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004fa80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004fc80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000050c80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000050e80)={0x0, 0x0, "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", "9955bb657036688945f4f4016e0d1cc3678ee3f0077d33089d9d0b901b748be8437c647a08a28bfacaed6acd9206e42a420fb83accd9f76c7c5209e6dae0be526e653ade3cdc02454a36abcea3ec7ed562980b4d59f3c1d758eeeb7cdeab6146dd4badb41859778de6e0cefe7dbd01a7f0b771be19bc6425ced24e48b2e757bfd4bb3820246ddaa680a2994239fd4defa967d50a9c0dd90e7e80b32c883655852440cfec052c54a73a3fb523ee4769124d775d0db5a859c75f4c6a074af66e1eda119f6408ba47b227ee22182b4d079328e2062b4007cf8948d2d09a03b94731a3dde0bf047714a85315b212e63465c159b6fcf2cfe0ba688924cf21f7e56b635343fbf0b47ce76fc2afbaf922b0e057d2f79c084a5f332d557bae9c180f6b8ce70aff405658853b2cf8baa0dbc82b99300bf48e3c91e6d8832ed9cc40024e839a1697b6bf3970e98873cd1610a3dff49922bec5dcda340b9d7b3ce50b5429424b04c43f9de86c96d732411f18c56f71ede4f7d355f15db9329a016f576752b2b150db1489a6668c902d54471f3d79c01205856f279225f3ce7996f5562975fef819c6bebce593ef85540e3456ebec8dfff93ceda933df1ca714418f2756aee89661d69d2d8258f5fe25593328cc06e4b6e0ad4df5bfc26603dc5c3dff92b12fca9dce6d59a764071a17d4e6eec7b907a108b9deeba32cc5c043fe51d9680f8a2eb0cb7bd7bfab56101d4381db92853f36982fa253765d276f1740441a9fe7ed0c55ff13f56c0d25ef9e922dc8cdb591c859181d1e2696bc42ed5de044c4be4af1ab582216690e826f63e5dd2cad20350ec6b61ec3a13f8b9d55d9af8fab49784954872efb446379ff917cabf2281791d12ff5ccbcd0f10a34e2c35c93a3adb2ee525fff75e1eb27a69c6794763c9294c26a8aa7ee8012e3de9a142f28dd8fe8254ce4c14c2ad8702a7a4839e1d5ffd897036620b17dbcebde71d0ece0b732cad8adad544721c1c6fd7612be4c29fd9f9f081fef5a91a826c74d6d0c1b808cdba0ee00d1bbcf6642099c1e953b4c825a97a0a76a7b33b5e387ce435c1d444ddd4771f5bf0a3f4b67047666ec99437b5c018cbd802330870aa37b248e7849b16051d5fc385c9b29841591306b92213310cf12803f1ac4f555f7c03896e60fff586fa8191c9432cfe9d2f5004314a9851800ed9e2702d1d297a73f84dcc3971173780ab66b9baa11013a584efc5f6f021c6fe65cd28e2e71b9f5ae2d94ba5eb4ff9bd16f4b24420c1e02ef839f25be3cdebde2e09b905cb96f568069a896c5bf2caa59214ae05e6a9b56abb124d307d2280ae311c09c803675eb675f548e0b174adc5c4204091d14931e1f91e8b24f291fafcf800345a4daf361fee56a269fdbafef7a1da896c01d39531c958d4994409ee0255e2864e0c335bc9f9175bfb14b7a735d5e64500e233b3796029a480ad14cd7835f9ff3ea5cf27b46058e43472b12bdd72aeb037b25852ffcae4d5a7e2e6740ff23f2f71f022c6071cf2ffd4351feae9e80d9e77fcc106dcba7275d9f17a161298704c0c1f8902dd147daac2334b4c8cb6876e7ae27e3b4ebc1606f49d7480ba8ac0ae1f8d281197a9d689c465c0e726ff9523e9b54615787dbf66270f07c59b3ee8e72bafe4f0b60cfc763e3092d8a1505f7059ede29d23b5d9556b6facef26178e4ec20e908f0305b40cf1c7f1c7c92120d0400fa35066712527ca59ce97ad228ffd5fb284876e17c248c600217720ecef5e431cc8190c9925ca6b8339d1a79220b29a9a4fcd3674bbd6ad97c65eac5e7aa523c51eeaf05d8734abe89e37dda7e0fe10cfa01ad0882e3527ad4aafa84d8a6c0b5b059688e0552b741e6cb1addc7847caca1edd39d08c9cde75ace5640d0dec25e620bc97f070b7c7f9ee99e5608fb0d9d6254deb028c46caa7c5e1256e991440c28fd0693bee01d27803541864c8ca66fb9ca5fd97939a920a9291d08e009a50b7ce71349e62f8ad0572c21f2ae141734f04b22901ec10661c85f2572d082c042a4d1440ca3e471e8fb091b293d08c8d73685685718202d672a73d9a9cc148ffe2224603f2dbab0d139ef02d965a03b76b9efe434fccdb030a538baea1d4c41e1192b38f981a1e3c83ebffa52a95f519da02301f971292166e4def73bc4036a9444fba8858c1ec43d028749fc85842b89b13c550f59677e6109663fc0df872df6a018213ef134337b9a847a7a871e4b9aa911574ef82bf193f1d54637855e459ae5f50a682a525e0d853bf4b46834bf85931eaa5bf4c6bcc8fa1247fcba580a30d899eae04b71ce3df753e272f5dc7ca0ffa3430c21012848393d0d6b715008ccf4e9c70d26d3b8d888e92841fbd829a737dd59e279e373dcce05caa2cc9593e3445d17c9b87b601d022989ac779044b9d2d1a28ce64f08a59dc4d4849f24b6f0bbeb7029b7876904af361b86b3ad0c617f3b9efea7c9010de0ab5efc2ca33c8fd71177bf2a5f3da0adfeeca87890074030258b07c1e485ecf6c9d5ff4aaffd30c6725f5f8fc7df1b34d73f701fb124539c352b03c55b3b44597f1a5b098a8425bfb8a46861d50c1a4b833867bfb482553f17fa9e637d9435920c9249706c4f181b39dbeaab9fe425300b4f6842af07e997b95d5625952cda737000dc5fbb711074422383ce3f8446ac77ecc50c9c65043185a26dc49deba3e8f1d8ba18b5912cf96732495fd8430e13531bd5efeefcaabac786d0d7f4ba12a6de29f81fbd368bb3015d61eef66311c56d5bd39dd932f638220e408e2425dd7b1580723ebb9d6cb6d965606c037788dbde4a211046946fba1ac5ea6361a8122ecd3ffb8f59b889489284842e32995839019e0d1043d82cdbfaa1958130c10600d271bc2b39d2ac1175312eec33cd81f611f21207128634b52ec9787fbc2f0a8e0e810b84aeaf4678fd7459bd752d75345b587ffc45013d15a3eca1351206b253056d56b401969b8177107c404745d3f48c5f3ca8c109ef3b1d334c13cc06c9042846146cad434be43f3eea75ead22e62bc6c86608a44224dc9527cea4da18dadeb38cb4d3992061d53c493a2f7188627626b60d864503a3e51b62a74506b34e45a8ba1333589e2a0c42fb1223502404e9b93922dde43c9a95e5c5227aabf5e230d6a152ca80a0b9023035ab15d621c315e87754fba5b9c10fae68661944cb0c6e949bc71191388588127ecbd1b3930fb560e3ad3b901f066a275fe68a10e685d04a36ba3a4271c8af2c35a10e24dc4308a7fe84d6ff3a57eb401177ef4d96a46ca959237be03411f26588100e9c0df40aa9434b9910f2e8116fb1b22bf820d219258852238d5d94e8c63170173b3b3b13faee6e6bc42c7c00c7fd260c5333b9dc98ca9eba6f1cf619b7cc214f3e83aa0449965c59001df8110420445b12f2cad7c187511e4af03dbf231b352f768ec11e653f780cf8fd21d18f12710372cab93baabdccc277c6b74193b61ca58769c3f34c2ce503a1f209cfe1b55464e1075b04e77f24d9fefb70ccde12b91acf16bd610d276b292ad3c913290c7f79d014a0e0a18a02be0e755044243455fa5a36004e1be39aa6ec3cd50df52ffe0782ee00e254f2df80a44b4f1c30363f4ccb2d4d6b9d84145d69b5f3e9933527f36bfc9dab0fcbda4eadca97fe3146e1bf67cb44890eba6d8cb2dbd5be410bce2a8fcefac80a5248d721a58c1069b2a4ebc17bc0fc0a068c8fa65b0d3f022e448c27ab38623fbd920b968543cf23b6b052e47294d90dc94bc71daa7fe2b13fc7e44fe7749224f1e1474d679ddf569007a7226638805fb15ba1321c5a7c79467c558aabbf17f3d08f9166b10492e94316e550a2037f3f6549dd616b888a7664f2ed0227bc585482f7b9386035fdbe8903f197c72321dd5d77c92c23d815e4acc7932399f570edb20b04498ca8f55c532bf102329ac7a6af1047b1b25a6ba6db896cbd988ba9082f16f3350639280907435e2b97c7ba2b77d0c3cd3ee124e162b0eb32ad6e240cf04ea4fe22b8242f3e4afe153f12862264b78ff86eca3656a760367a7439d924c5dbfeb54863f83d1ced81bd8f845bbbb79dd8f6381fb360503cb5c2575c1b32b430def17f0a3974a33c69687aa3d060b4949135ee6083e09ba60de988df4e3221352bfb3face57ad13e53f233f21dd5609af24a3588fd9118cbffc8048f6e08b1e4e8fec6f520adf95db780c5bfa9f6523c43bde2b1cc900f5f7a291a8eac49ce1fa8fa5785305697a43170bc3bf5eeb0dc07c730714a2df2d416f4529ef4b92e7bc2c969d2fb3129cc4e11e4b85ab065cef3f16b5e3817cd569ebbbb7e35856371880e7903fe21c37100c6818bc7d5ed32c8e53ed61add6d6c346586acbf294041cfcf4e0bbf47aa7d7001f00e6b5b78197978c735e1309eb81b12b61fb4002512c5f558a2ee7aac91ba7c8ab245cccf7cb83b9a5659183b14706fbe71d95e8b38321435545fe9af9d07e31fc2e99f5701aa84f568ad6e9c9698660615b3ac4af3325bddeca1cac25b0dc93e11ee08afbdf7f7d0fdfdf138fbbe22ed0bfc701e47cc97c655f2b035f49d7b9900896495319b440bf6074ef2758552c937ef67986dd2c8f1a1e583506233ecbdf39c6585953d437a4a46701e8bf418e54e50f7cff8296f551fc7ea359a068d2ce2fea604dfaddf23d65c31bd7f56e9d0fcac2b3ff735b5060e477b2eb2b740cf2aad9acf40d2f396f37a5324b0833872d9e04acda67b291b3c8493e16f040b88a87a1ca1197de39753f06c1f3d9119f760fc1d567c62f621bc92345c9fba5dad8db663107cc4885fb459b9f4095f42f823ca74e3b2a1ce64b26f606b89401837789d512f5ef570f56a35b2aa9adfb54133cfe9edfc0fcd4d2987eba99abbd7888c381863cafba1161433493b08d571f31746a3d4ae73306bd93b0aeebab94da748b7a40de73df4a779c642fcebc6f4d7a4434da564330a4e357aaa7b5bddf006a998a3fc29a3c139759271295e5bbccc0c25bdaaa1906cf06fc517ae727e280b0313b182c2326ef852a0d0a635621b0c8aeba09afdde64d44484459f65002c998af2fe6773b51876d29e46caa8dbd1cf7b747baa684b3a88d75a120756214f6478c89126c56dabaa656a8777f85366aa8d51a88863e2d7b682851a285d5f75c2521151ec4a7dde5459d45f9aeb4b65cbd30319d4a88b3d8c4de62d3af4dfd0debff9a7a7ac97d0948f9fccdcafeec6b4f6a1eda2ff1e337cb4b1d0201a9ccfc3ac8f47f35764c6f32e5a2693c4ad61e74c8c6d3b29c04454048edfdae575503448e406109cda0d96c4f1662f5f2a77cf709742dc300b7359076365dff4dee6b7c1439a4f4fe92862eba4174113c1d415ba55d3a73e7571addb4064dc271789deaa14c"}) r15 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r15, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {0x0, r17}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000051e80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052080)={0xc0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {0x0, r6}, {}, {}, {}, {}, {0x0, r7}, {0x0, r10}, {r11, r12}, {0x0, r13}, {r14}, {}, {r16}, {}, {r18}], 0x1, "66f0825eefa0d9"}) 12:39:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x40, 0x103382) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x9, 0x200) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup(r2) lseek(r3, 0x101, 0x0) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) writev(r4, &(0x7f0000001680)=[{&(0x7f0000000200)="a3d78b2f623156914da72a889e0524d242c55082d9fda27f08d60ee84a810364972d678bed0a594d39ac6cd2d54e0a5236e273c9d6e0b2d8b30a09e699c096ae53ea8e7b2d0541371cb703a7049442437f4323c8a0eae47e0b47181b33ce5e0e13b1ddcc51c27f5d3c51c4d4c2c14419a006ba4a6f4cc0a8698581095490c80f0b139cf71d08d8a2089e21f23945fbda4319a3f0691625ce39542a925d1240252213cdb56e35728d9b45723a8456f720a7a5a9d0a203504cbcf121626648f11613bf557de767ae202c6f7b42835f85", 0xcf}, {&(0x7f0000000100)="ff3318cff2bf4c510e13008338a5e12390ed4573056aa02b57e773fcb82a389d834cafc8", 0x24}, {&(0x7f0000000300)="6baf2ac5514c19e8d9931e14ebfd01310f8955d7735fd41279fd8ea1902089cf0cc40d740d444b34195494b7f0e54c90648a5a026a5241f37fc863c95698e7c575198d29c0596032306bd8f2093332557437204766e8824c483d728c4d890bba24592f90f921fa80b957876a28ee1c8e8737289f18b2bda8a5692a1247e0f03227d680298bc963edc976b373493070758ae5f06c7b68bac8eca760bfe2c580b3ee2bf751310b668d5360fffd13a550bb1a72d58e4567f95dab5bf830545cb0d703c4d8443b695160b53f764ae977da7046a0abe0f655ca19bfe1de4d01eb11e575c2", 0xe2}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="1621d97dce9061db0164968114ee47308d0b07255e2beb87d2c421503008a5dd4c384e200b038f2ba99834dbcde32f46d02a9b61fd98a66decc870e0279d2ff90bfd6cff85c3a98ead387d228d1d913030bab7acfec324b163a6f734af4b717822e6c0c9715d2c3b32e06a4c7f3eb4b48842b6e2655c0db2260a4318fde0bfd5697a938f7eb08880984e6c58878cbb4aff00ca925ed937c15a81bacf5d3d55af303bbb93557d67456b6aa80e3b5a69fc122b4b0c2d4f836dd8cf1d9c45d46bd7840f37a3fc7544576080a922", 0xcc}, {&(0x7f0000001500)="ad27ff93a5c90b9dca0854ac6c6eed053dfc379a3b5ca18637e7b92396642b1cdb12b2d415337ca8f4a96c90ff7bc873650d153ea3c12b24ac8bc002b24db75ddad766cd11d49583294cc16a01296ddf4ab6014ea9557b1fb48bccdca8883f52d399632aea7028acb1cb124f2107ef56edc3da7dc6e760bee6127ef582d0d1b58822067edeeab122695d445f3c9161b2d1d811ab606fb8ef37d05c7a58561193bf43aa017f0b06d4649256387a90dccbb2468beba4e9025229592680d6e58abd6bcd4420778fbac64954c6ed69844a89c0f398940e7d649e59afeb1f0a7a17217c8dc9faf0de8a1846a35784084dbdbeef3c0d139c", 0xf5}, {&(0x7f0000000140)="a27c895415564634daecad70f59491f4c1f51c834192f5ca3e95083e03b122f5abc207630de0fc23f8e098be6fc97b57a868a953ea13ff33e4e3f24bf9d2f8d61ce6e8fe3a185f1d1ed9374859b71e49274b6d525ffc006f3fbe425c94a094cd63d6468f63e068694837961449339d9ec9c206ee3f124ce3b37740ebb9", 0x7d}, {&(0x7f0000001600)="5c83f71cfb99c73410588bc69c0c037e6219a482c03f3b9ecca9fc844d6f4c8d24cdf3c6742ad99140dddf370a8c5b40c2fcf1adab61fcefe0f892cb0c839b327dfcc632065dc023", 0x48}], 0x8) ioctl$LOOP_SET_FD(r3, 0x4c00, 0xffffffffffffffff) ioctl$FIOCLEX(r1, 0x5451) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f00000000c0)={&(0x7f0000000040)=""/80, 0x50}) sendfile(r0, r0, 0x0, 0x3) 12:39:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000c000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 468.833380][T19592] ? skb_put+0xb9/0xf0 [ 468.837458][T19592] netlink_broadcast+0x35/0x50 [ 468.842271][T19592] kobject_uevent_env+0x8c9/0xc40 [ 468.847381][T19592] kobject_uevent+0x18/0x20 [ 468.851893][T19592] loop_configure+0xd70/0xf30 [ 468.856605][T19592] lo_ioctl+0x583/0x1270 [ 468.860859][T19592] ? unlock_page+0x37/0x50 [ 468.865341][T19592] ? __rcu_read_unlock+0x5c/0x290 [ 468.870382][T19592] ? blkdev_common_ioctl+0x438/0x1120 [ 468.875848][T19592] ? do_vfs_ioctl+0x819/0x14a0 [ 468.880628][T19592] ? lo_release+0x120/0x120 [ 468.885198][T19592] blkdev_ioctl+0x20e/0x440 [ 468.889791][T19592] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 468.895273][T19592] __se_sys_ioctl+0xcb/0x140 [ 468.899884][T19592] __x64_sys_ioctl+0x3f/0x50 [ 468.904488][T19592] do_syscall_64+0x44/0xa0 [ 468.909049][T19592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 468.915021][T19592] RIP: 0033:0x7f41f34498a7 12:39:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005d840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xf7, "a0a856f0cb40c2"}) r6 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e840)={0xff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {r5, r8}], 0x8, "1d4c5f0aa4cba9"}) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r9 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r9, r1, 0x0, 0xffffff04) [ 468.919444][T19592] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 468.939198][T19592] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 468.947628][T19592] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 468.955717][T19592] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 468.963695][T19592] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 468.971741][T19592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 12:39:30 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000001480), 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r3, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0xc, 0x11d, 0x0, 0x1, [{0x4}, {0x4}]}]}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0xff}]}, @NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x9}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5, 0xe, 0x1}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x2}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x44}, 0x20000000) sendfile(r1, r1, 0x0, 0x3) [ 468.979873][T19592] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 468.989201][T19601] loop1: detected capacity change from 0 to 1054 [ 468.997614][T19590] loop2: detected capacity change from 0 to 4 [ 469.004107][T19592] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 469.007563][T19601] EXT4-fs (loop1): bad geometry: block count 3072 exceeds size of device (527 blocks) 12:39:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100400c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 469.025359][T19603] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 469.061230][T19603] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 469.097074][T19608] loop2: detected capacity change from 0 to 4 [ 469.104132][T19608] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000040c000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 38) 12:39:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000340), 0x400940, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r2, 0x80106720, &(0x7f0000000380)={0x4, &(0x7f0000000580)=[{0x0, 0x7a, &(0x7f0000000440)="76828e6be2f1db276b81604d50d212c2d651c966b80c80a18b6ed55c789667b5815607f3f9e99e510ffbb656243e0c807c669e0a5a76b11dfd8ed83706e5e2ebf30ba68cdc553db09524a0d5e42b0ca42169dab366b56e07ff43b92af2ce0485ed8c2be1fcdf51c6081b92774731c508f098928d1bfad250288c", 0x1, 0x73bd7a4037397f76}, {0x401, 0x96, &(0x7f00000004c0)="fdcb83665c7aeacdffc5f2a27f275389e5cefc87190902a8e997d587c76196a599fc2c8b5d1baea8edab5b2505d934d0f67a501e1d11b26b810ef97d8e90176addb9ab27b1e842f8d036457012167fd8c77fcecac83e7383794a707dedb05aeeaffc3e2667d4653c3c16b9d560ee572f130aff01a27bdb034fd081776d6ad10853149d11a60e20c062dab18ddd5a42de9072cdc1a945", 0x1, 0x1}, {0x8001, 0xdf, &(0x7f0000000800)="a35048508604bae4c6b6b8abf0d0f44b328cf6a8a4b428ba71eddcce2114d30428d1c8cfd764b53220ec760238e5e2fbcf9adc1e38bcf5f4842b537415b224301d2a2bb3e6163f863f2c2c1c67c14a30d7c0fba24a25f77633489a61ff3d39e36d719d039e87f8aa5898e5b3dbf5123e6dd9d08e1cde72c225bf5afc11d21216d74a45d5a056acb1405b5d1466238aa9d7feb6b72bf40bbefcc2657a6b2f7c676f4e30e67f17b3d7bd02395d51312af7363fe5ca21d0adf28768f948d5a4db4095735c3d8765f81000f0300558dd50c3b1ed0419993663fcb76eaa7d43fd23"}, {0x0, 0x87, &(0x7f0000000900)="b78c12fefe33f7db54d20af566ed9f7ec9d14ef298ecef790822015a349b1c26c972a279a211b73f113a8652248e0768665c00b4e2fd9c9e9dc70c81e892244653e084a43866d931db66501d7a4f393fcac4e7c2a683ab141132a4194ff44af9dd30d43f9305664dcbae8e3e70e546598f4eb6c54d26844605483d3c632cd8476ffeeb5e0a3090", 0x1, 0x1}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r4) getdents64(r4, 0x0, 0x2000) sendmsg$IPSET_CMD_TEST(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x78, 0xb, 0x6, 0x101, 0x0, 0x0, {0xc}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x7fff}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfff}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}}, 0x4) 12:39:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000115400c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 469.351372][T19616] loop3: detected capacity change from 0 to 4 [ 469.357678][T19616] FAULT_INJECTION: forcing a failure. [ 469.357678][T19616] name failslab, interval 1, probability 0, space 0, times 0 [ 469.370348][T19616] CPU: 1 PID: 19616 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 469.371331][T19617] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 469.378805][T19616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.378820][T19616] Call Trace: [ 469.378828][T19616] dump_stack_lvl+0xd6/0x122 [ 469.409718][T19616] dump_stack+0x11/0x1b [ 469.413897][T19616] should_fail+0x23c/0x250 [ 469.418331][T19616] ? skb_clone+0x12c/0x1f0 [ 469.422766][T19616] __should_failslab+0x81/0x90 [ 469.427566][T19616] should_failslab+0x5/0x20 [ 469.432113][T19616] kmem_cache_alloc+0x4f/0x320 [ 469.437037][T19616] skb_clone+0x12c/0x1f0 [ 469.441292][T19616] netlink_broadcast_filtered+0x4fd/0xb60 [ 469.447040][T19616] ? skb_put+0xb9/0xf0 [ 469.451138][T19616] netlink_broadcast+0x35/0x50 [ 469.455993][T19616] kobject_uevent_env+0x8c9/0xc40 [ 469.461102][T19616] kobject_uevent+0x18/0x20 [ 469.465619][T19616] loop_configure+0xd70/0xf30 [ 469.470311][T19616] lo_ioctl+0x583/0x1270 [ 469.474816][T19616] ? unlock_page+0x37/0x50 [ 469.479291][T19616] ? __rcu_read_unlock+0x5c/0x290 [ 469.484420][T19616] ? blkdev_common_ioctl+0x438/0x1120 [ 469.489814][T19616] ? do_vfs_ioctl+0x819/0x14a0 [ 469.494703][T19616] ? lo_release+0x120/0x120 [ 469.499216][T19616] blkdev_ioctl+0x20e/0x440 [ 469.503752][T19616] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 469.509411][T19616] __se_sys_ioctl+0xcb/0x140 [ 469.514059][T19616] __x64_sys_ioctl+0x3f/0x50 [ 469.518668][T19616] do_syscall_64+0x44/0xa0 [ 469.523152][T19616] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 469.529060][T19616] RIP: 0033:0x7f41f34498a7 [ 469.533477][T19616] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 469.553177][T19616] RSP: 002b:00007f41f11bff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 469.561634][T19616] RAX: ffffffffffffffda RBX: 00007f41f3493970 RCX: 00007f41f34498a7 [ 469.569617][T19616] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 469.577631][T19616] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 469.585612][T19616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 469.593644][T19616] R13: 0000000000000004 R14: 0000000020000570 R15: 0000000000000002 [ 469.602194][T19614] loop2: detected capacity change from 0 to 4 [ 469.602253][T19620] loop1: detected capacity change from 0 to 1054 [ 469.614920][T19614] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 469.615486][T19620] EXT4-fs (loop1): bad geometry: block count 3076 exceeds size of device (527 blocks) 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100480c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000d000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001004a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 469.655971][T19616] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 469.673557][T19629] loop2: detected capacity change from 0 to 4 [ 469.680674][T19629] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 39) [ 469.741749][T19632] loop2: detected capacity change from 0 to 4 [ 469.748960][T19632] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001004c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 469.783236][T19635] loop1: detected capacity change from 0 to 1054 [ 469.795364][T19638] loop3: detected capacity change from 0 to 4 [ 469.810695][T19635] EXT4-fs (loop1): bad geometry: block count 3328 exceeds size of device (527 blocks) [ 469.811226][T19640] loop2: detected capacity change from 0 to 4 [ 469.827666][T19640] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 469.835639][T19638] FAULT_INJECTION: forcing a failure. [ 469.835639][T19638] name failslab, interval 1, probability 0, space 0, times 0 [ 469.848339][T19638] CPU: 0 PID: 19638 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 469.856861][T19638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.867007][T19638] Call Trace: [ 469.870289][T19638] dump_stack_lvl+0xd6/0x122 [ 469.874988][T19638] dump_stack+0x11/0x1b [ 469.879188][T19638] should_fail+0x23c/0x250 [ 469.883635][T19638] ? getname_flags+0x84/0x3f0 [ 469.888478][T19638] __should_failslab+0x81/0x90 [ 469.893259][T19638] should_failslab+0x5/0x20 [ 469.897826][T19638] kmem_cache_alloc+0x4f/0x320 [ 469.902603][T19638] getname_flags+0x84/0x3f0 [ 469.907247][T19638] __x64_sys_mkdir+0x31/0x50 [ 469.911948][T19638] do_syscall_64+0x44/0xa0 [ 469.916380][T19638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 469.922442][T19638] RIP: 0033:0x7f41f3448bf7 [ 469.926865][T19638] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 469.946685][T19638] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 469.955308][T19638] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 469.963387][T19638] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 469.971365][T19638] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff 12:39:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 469.979348][T19638] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 469.987427][T19638] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 470.019689][T19640] loop2: detected capacity change from 0 to 4 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100600c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 470.069205][T19642] loop1: detected capacity change from 0 to 1054 [ 470.085963][T19642] EXT4-fs (loop1): bad geometry: block count 3584 exceeds size of device (527 blocks) 12:39:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000020e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 470.172680][T19644] loop2: detected capacity change from 0 to 4 [ 470.179865][T19644] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.189691][T19623] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 470.210557][T19646] loop1: detected capacity change from 0 to 1054 [ 470.226886][T19644] loop2: detected capacity change from 0 to 4 [ 470.231650][T19646] EXT4-fs (loop1): bad geometry: block count 3586 exceeds size of device (527 blocks) [ 470.243971][T19644] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100680c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000040e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 470.366101][T19649] loop2: detected capacity change from 0 to 4 [ 470.373495][T19649] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.389410][T19651] loop1: detected capacity change from 0 to 1054 [ 470.405225][T19651] EXT4-fs (loop1): bad geometry: block count 3588 exceeds size of device (527 blocks) 12:39:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001006c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 40) [ 470.456305][T19654] loop2: detected capacity change from 0 to 4 [ 470.463195][T19654] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.496892][T19654] loop2: detected capacity change from 0 to 4 [ 470.503399][T19654] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.519515][T19656] loop3: detected capacity change from 0 to 4 [ 470.533309][T19656] FAULT_INJECTION: forcing a failure. [ 470.533309][T19656] name failslab, interval 1, probability 0, space 0, times 0 [ 470.545977][T19656] CPU: 0 PID: 19656 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 470.554397][T19656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.564454][T19656] Call Trace: [ 470.567736][T19656] dump_stack_lvl+0xd6/0x122 [ 470.572959][T19656] dump_stack+0x11/0x1b [ 470.577205][T19656] should_fail+0x23c/0x250 [ 470.581631][T19656] ? __d_alloc+0x36/0x370 [ 470.585976][T19656] __should_failslab+0x81/0x90 [ 470.590781][T19656] should_failslab+0x5/0x20 [ 470.595294][T19656] kmem_cache_alloc+0x4f/0x320 [ 470.600214][T19656] __d_alloc+0x36/0x370 [ 470.604434][T19656] d_alloc+0x2a/0x110 [ 470.608418][T19656] __lookup_hash+0x8f/0x180 [ 470.612949][T19656] filename_create+0xfc/0x270 [ 470.617668][T19656] do_mkdirat+0x53/0x2c0 [ 470.621914][T19656] __x64_sys_mkdir+0x40/0x50 [ 470.626513][T19656] do_syscall_64+0x44/0xa0 [ 470.630936][T19656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 470.637107][T19656] RIP: 0033:0x7f41f3448bf7 [ 470.641577][T19656] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 470.661188][T19656] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 470.669621][T19656] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 470.677595][T19656] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 470.685571][T19656] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff 12:39:32 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:32 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000000f000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100740c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 470.693573][T19656] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 470.701579][T19656] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x7dd, 0x103382) sendfile(r0, r0, 0x0, 0x3) syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x10400) r1 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005d200)={0x0, 0x0, "47971363f18ca3d1056ef777c91bd4b81edac03dd35474dcaf8092d85d43c9e004c64ce29418f91c2a8f8c03459df6f29275207d932e0140901f833bf2bb2b3e37a6fd3c8ba4588c2805720505cc145cf5feef2aa6f8088e23ece114cb7e8ab0248809b5b92b09a8e4d8c205439113128a389f76fb1286d5309a05ca8e5fbf6e4e1a1f1e35783c6fdcf275b70bed44d28e08faa0d5c1a00117482ac87b5a0dcb1f78747085e0426fae7282ea4bd9a293ae1832f689c5401951ab7c204e06ca69f35c906f082c607ef9ee3ea95cf56225d4b6c1446f3d74468e6602c598de1ebcd328490d5fa713e19b620f0fba35f7ade78b9ba16424f89cc3439435efb8d06f", "c67817f6c9223ca5f4bfcf34fd539d48253c48a8ac7c63f3048d029d1e68d1ab3daccee862ad8c7d768136d708e134c5266de50f4f3f4ddc5497cd556f3191c08c618537d386dd83b7d0f9a80a0bf211c523bf29705bbd0370aa851cc3f722ad1942cdf44f074a945d3741144757846f3a3514a9a6e82ac0115485fcb25ceb84ad7b0dd79cd2b5c6dfbfbf95fb94fa0adbf15dadc969dee3ab66dba881bf99300702459a0c40143f3ff0cb7b0428b5c6a000f11d2e38095617ba86d074b9db46c9dbea341a47c3a1fc5de079c92f866e86feb22edace1ef4b17b3b09b820942cd1afc5e5998146869e5b4295de5f116afd2ff571e5e64bd7d9d2a19550de4ea7cbccc276b089702b4de71766de98b709e86733056ac734c91e47afcd1791f6f8d5387497acbbfaab0f272f29001f6945d96a1e07dd4605fbff596ded131ecb2d5e60c9057b33a49d13ca7811fc9298c39ca2c574244b143d3042dc38efa21e560352c6902ede5234cc8b7f3e3b9eb760816eb6a9a3cf9922f2a10122190da36703532f30d436742d05ae4a788e287c6818db7d4e67bb55f1b89bebfecca19237958049ead5cedce4e9777a389e7fafc4d6000ad4bdf921280bbd7b7ca08c316a80cb09990207fb0f9aa8cd985bad585241dc62bf65b44d8e305b1c4ec8e44fa4a3fe3b210acd43d6ff9ec00e98c11b35019250c7fce2ac0f02f8680eb557d482efde71652057693522b275354368104430910ddbc75b06907954b2805a3a29271115c8b2fe5805dd2614a9d4a1cd533b6712adba2613bebf44ed45ecfc286977a5817e00a33f5614b635511bd59eba6c91825966c8bfc7d98ccb9be880ca3b5f3cb4998f9660f109fdff77da8b8dea44934bfa730d92d257c2ce299ea70c49f50c4f571957304d10a4297809034dd3cad5e8637e6f2212c8c5d303baa920e809ca9d1350d4443e0dc2b243f609beb3575b55a9b94692d14c8e6e943e30c12dc906a3f45adb088e7f604cd1c3d425fb6ca09475b0812cc70c6420a580f5463106cd4fb3fe911b7a2c4eeff018e3c3ee2b9601ac048be9b0ef3cdb4742cd31f12337472d5d071121ebffce736d366a1d7582e1fca09e2aae80efa883e9ee1faeda1f1ac628228bfd03ed59ce7cb0e0a8b026c343a2801d4db759621d62f536f924eb2df8473c6c995d1a8783244c0e9366a69bf263e6ee172fe757caa1f92346863954f80aef39eb15c0a332798037d323c66fba0357cb2a0f50accc8e6b8285bf7d08e3a72f073de17ef1f72abd1051235f2b5734605c2c4d6a12168c28ce7a312b9eeedfb213bf25933ee5004d42e485ac8f12379ce8826e509eeb33982815b6a922e5d79899c79ed80eadcfdce821ae37bd4c982a752a8021616eead0788cffc0cfc44ae6f55acdbbaf9833a871af4ae24b9d1bb9e70c33c83aeebdb975fa84abdfec81d367cd9a67b714e5c27df5c823421beb5628392ca87b4a13f968d59e408c7affa79a394829bc41de974671f0b682da2cdc6f192e5e0aa8966000854cae61e54d70c4f44d561a70b623106bfab73cf5f429e97b9c558396387c20908345180013bb4f2439e15c8c0e0a0a6776184630c066f5c9646973248cb3aa5fe4388f22b85c5ca85123fa806e5bbfbeedd22ac309baedc782cec4ddf4522688f7a4dd2bfa74b671e282bb2deb2be23b0cb48504b79f79ed4cf12e2665ca88a1213a451fa9978df17f6ec77877c0826ca902a495f2696af0896d02ad54dc26dd2dfd8ed6a4c97785cfa99a6a7238a44261e8244e346cf8be20a0bf694254907b79e7f59b7260f7f4cee60b30f77c6ccd56d954983214a5b35c09fbf644a6ef46fc6b189df7f3e4a89a797a3e1e39f5d57532b63cfb2c6fa79d68ce3c3625c94d3f3f6a806b47579c681e4f228b594f2b1b4e5b65703620b431299d5c3ee71533a342e599fc064bd47b6ac9f0cda29a95136441b89f3d6ad013e264467a2eb9e48791de6f524b64f8b6be38efd56c5c5a85a87b32a2d6a91402b3415c76a455e4aa1aca710076544ae10952e92903e68d2e92974112e98be5583a4d5c260f71697461ad8ff4f08a8faef023a7a69c9dab6891f4487674c19d422c3a55e4fa4542e9b1e64bc4faa74b6f7b652c6b652e4a3c5955c33601f5c4efe1c0269241b3d66e00d60300482c1e515e86bfb68438162709fa2c385ae266446dd13fc81f91237778bf2c31cbdb438c6ab6cbd32cc79d7db9b8b1c76c1e65c9fbe8650f96c5f49645f70022f1863c624c0102e4a8d4132f8add853952538b65a20c0cdc0154d3d7fa3adc39d703ba1be83e821ebbdcdd57e65dd0ef2540787df6b4ddea367738d6a0de40603976b2f9d02443ddc19fa99b096b0a4bc2649257c167ce4fd5f2a909e68dc9a267caf76a1c23f77f8710509be610bf9ae9f1f0a0659f8a654a9469d24693aafd620dc5c7b4c75b663176e881bb916df6eabaeff82114b05b50fc82e4f7b3ada4d31d12c13cada9b1a3b833151375ef05b2c1291a3459597e92ed25ee1a855037ed72d846ab0eac51757cc08bf3058da27a35780f7f84eb8a3e255a506c28a3c4c64c62d40be549ff4b8b3a261b0eb1959bbc65b08e180ba7f90af59b0c905c7a3ef2ed0f63655b9eb4d927ddba942b6d1aafa7dd22b6435775234dfa24264fe63147227270d2038849cfaaad2c936df0de8b5fc317df82290d02d9486f8354c4d4cddaf1f835d316df0bed6a8cdcda6ccfe0141bc80d5b68a60edfe90589d751a35fcdb0a7e3f3289f010df7644cfeffc31bfb21077961df94bbb492807f0cc5e6be6c5a69556c2dffe0a7cd14fe32e8673220a82cfb428a2015fe7a5f2ae3b85ae371ae3110ea1db8ab812a5f2a56834ee71fc60298234e0787624edf85756559fda3326c1d825d651f1cb7865b9739c3d2ca13930735bbc2def0213883f97e2d09e36933272b8828ea8deb45b59f1886638e8f0f61ca43458e75ec0c67d3ac3ce72ce015ba8370d644474ff0cfc75d7003e2cfcf8af89c518a4727b3be95749a38010663e16dc8908c4b57f4515eaac9988c8f44b09b231a6c46236c58c439cc2117ca7ae2b2aff1ab7f9201214ac1e23997d5da5e4469dbd4a233618dfecbf30b43611ccbf2033cba3e69c68bc32aa52fc46fbdb4bff57c72d907314085d5037e36e45f8a971dbc71129bf0516f32055e3b630f473fa2a538b648ac555e6c5f1a2bf1cc6fd80329c9b107e66a76a61ded3b3215ff60c00f62b467b829ccbd4e46523ceafa18aa5f5723495e9f205e57499e08d2f782cdf1cef2624b3159f946889a7fdaef6e6632ab5facb2a579e3391c02047ee4837c84abce859ef25972359925cb3cb9126efc78a38961fc6c866d660160396f39155efb3261d44106b4d0494a8dde7cdb6d1811163b2c416010a91348818b4e6cacedeadcb780981625f72c6d98758dafe7af559362311eee60f531d2a6e3858aacbae7468b225e9b89b3d049fb3b35fcf84302b15cc88dfb197b9be86517602267278ab563901671f571c7a13542c13d08c42720059b9e30636163424dc3e2b4a51f95ba821e44154300df4f3498e25d1fae93a2432486c22e4d7336f4fe27d77f1209b3b691bdbb1a06ea9ee2160927ffc21c5918b3b6288fd94a6759b54cdaac6514eaa4c86b64061cc3a4085e3f2582ad999c07617e19c02b6730c67a1d798e7c3025bed6955dd3c6aaca331568013c2705d62eaff476a85a555f286360071af65fc6830ed662c68310996e7dbccc9e357ab3b9bd6c7aca879a5cdd9513389e4b09324ebe25c08e198d7c7ca9b6d694967bd5216c1fb09c8985bb7cf940d0f57524419fc904cb2b472212e86066f660f00136375be9bb0b8d96a0198533d14d838a2a651a5d0195527da14b478428b2f372e1a9b4efc03a8efd57e5e5dee457750b4a8d5e60d8fc85792ebc307592a5519f27bba36906f87d98b52a92dc4c39f450c704d02352b63991d453bff02b143951737a4255e76149ca5a5b97d6fea4729b248b58388c2c0e102fc6e44d69961e78afdaf5379d69645826b34f9ee2cbba63e1495cc0ea78db5758fd365320a3582d370b284d3c7ac102dde0337528119edc6d8e577cb2c5eeac9249227b0b667119a825222e34b91022196b660089bd6d27ddfeea1766c053211a37cd037a6a49aab5e4f33709f9aa1c91fa602c335a4065007314c691e635ae51f8350caecc6d19ada29c368a389148834c589a7c545b23630b79619e8c54d7237e9561a1e95e99c556a77b6daba89bfe2c9ab331169cd02a6142ca14b766fb95cd7395c593ac086d7cac4dc0cd2e571f1142ba224c8c982b4a1a3ff3bac9c693f05f8ed58f3ca6ad8f92cb3dce5122f6ecb3e158539eeeb40390b34a5928eb009d1cd4dec2cb92a1bf2a899cee8f505ef2a898f2892cd9face1f0a7b9e49b48cbe95acbd905e5ca605d01fee38ec114b57240ed233ad0ce4c9c8e46742655fe4f3e95b74ea2df7f42145800b8b0f55054795fd28707a5bbe70908635517db42a77ab8c8237570a2f3f7c03d7922883e895544792f79a6f698c7a510bd0a37550a76361695b601693b0688b6feb3b95d6b4583d26a42b349cbb79fefd0e492ab700082539b1cf0fdc2178f32c2526b1b5b892cd00ecf391e7847c670987382417a8e37148c89172f29780f2679d3d22778f0d438a3bb7eea83781777807f040408077381a124dc3d08634d64b805069e0182431dc581a660bc8ec93608f4bf26e3d71dc944cc5809869f250eed95780d1e67b012c54ce161fff2002862167bd0c8e683a3d432954959e382502f836fede1f9be1e5b2e12661772823d528c9c1640a4850220c842086261eb045b10dbfbb7cc9e8ffe78652834d59d1ac1a9b3e1bea94ff9347e92a36b3a82df099a9a46779158d573c9a38548c00677cb3e980811fe875ebea25d27a92d9b7cbccd28055831c8c720737cda4eb2c1a505d98cddff92f63a497bed359bfeaadb80d3062961d0092e3a6d9ad0ec638deb47f4741e882bc0c384a97a875dbbb8560b4a3ca1f77d416cc882d92e6075e12d89d4c8e1aad9bbc10f8556590446e0baf0950738c981af48d7635b0ce49e8d2629f5774e7757ac51b3af2e0bcb2445a3f082a4a1e08f1a2f2311df0e1da34070855d4ed4d447b4194d85d3c92cb4ce0d0b47987ce4e488a86cadb559eafdd2be0cbbfc9ef3ead707122588fb5f34266f1274bbfae17eca1a3c1fb382316da69096e9c0d5cd850a8abcb792712add6f6c03c6af931c4828789bf20e4f855be23cb394e3662fd26d31eb699413d24abef9f69c435d8a52dbba898f6099b437741f9312cb7743fde9176a0fe2ceeea6c37a55fb39d1574f658d41ef37c44e9461ffe35c15bda41aa83c93ab108ec8a"}) r5 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005e200)={0x81, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "98cc88cf35dfba"}) r9 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}], 0x0, "45146335e226df"}) r12 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f000005f200)={{0x0, 0x3, 0x7fff, 0x4, 0x7fffffff, 0xfe5, 0x1f, 0x6, 0x4, 0x1, 0x3f, 0x5a9c, 0x2, 0xfff, 0x1f}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005f2c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f4c0)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {0x0, r4}, {}, {0x0, r7}, {}, {}, {0x0, r8}, {r10, r14}, {r15, r16}], 0x30, "d6c34b2df229eb"}) [ 470.768764][T19665] loop1: detected capacity change from 0 to 1054 [ 470.775885][T19663] loop2: detected capacity change from 0 to 4 [ 470.783308][T19663] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.791934][T19665] EXT4-fs (loop1): bad geometry: block count 3840 exceeds size of device (527 blocks) 12:39:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2f1}}, './file0\x00'}) sendfile(r0, r1, 0x0, 0x3) 12:39:32 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000020f000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001007a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 470.816674][T19663] loop2: detected capacity change from 0 to 4 [ 470.823329][T19663] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 41) 12:39:32 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x6e79e88f, 0x8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x81, 0x0, 0x2}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x328002, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000140)={0x2, 0x28, 0x4, 0x0, 0x7}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r0, r1, 0x0, 0x7) [ 470.870388][T19672] loop1: detected capacity change from 0 to 1054 [ 470.881900][T19673] loop2: detected capacity change from 0 to 4 [ 470.888321][T19672] EXT4-fs (loop1): bad geometry: block count 3842 exceeds size of device (527 blocks) [ 470.898153][T19673] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.919881][T19675] loop3: detected capacity change from 0 to 4 [ 470.927205][T19673] loop2: detected capacity change from 0 to 4 [ 470.933757][T19673] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 470.952850][T19675] FAULT_INJECTION: forcing a failure. [ 470.952850][T19675] name failslab, interval 1, probability 0, space 0, times 0 [ 470.965519][T19675] CPU: 0 PID: 19675 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 470.974566][T19675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.984626][T19675] Call Trace: [ 470.987938][T19675] dump_stack_lvl+0xd6/0x122 [ 470.992550][T19675] dump_stack+0x11/0x1b [ 470.996721][T19675] should_fail+0x23c/0x250 [ 471.001176][T19675] ? ext4_alloc_inode+0x27/0x300 [ 471.006195][T19675] __should_failslab+0x81/0x90 [ 471.011030][T19675] ? set_qf_name+0x230/0x230 [ 471.015716][T19675] should_failslab+0x5/0x20 [ 471.020248][T19675] kmem_cache_alloc+0x4f/0x320 [ 471.025025][T19675] ? set_qf_name+0x230/0x230 [ 471.029701][T19675] ext4_alloc_inode+0x27/0x300 [ 471.034526][T19675] ? set_qf_name+0x230/0x230 [ 471.039188][T19675] new_inode_pseudo+0x38/0x190 [ 471.044051][T19675] new_inode+0x21/0x100 [ 471.048322][T19675] __ext4_new_inode+0x13f/0x2fc0 [ 471.053368][T19675] ? avc_has_perm+0xd5/0x160 [ 471.058049][T19675] ext4_mkdir+0x28a/0x760 [ 471.062394][T19675] vfs_mkdir+0x2c3/0x3e0 [ 471.066712][T19675] do_mkdirat+0x12e/0x2c0 [ 471.071050][T19675] __x64_sys_mkdir+0x40/0x50 [ 471.075664][T19675] do_syscall_64+0x44/0xa0 [ 471.080095][T19675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.086014][T19675] RIP: 0033:0x7f41f3448bf7 [ 471.090513][T19675] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 471.110123][T19675] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 12:39:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001017b0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:32 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000010000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 471.118598][T19675] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 471.126587][T19675] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 471.134565][T19675] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 471.142544][T19675] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 471.150517][T19675] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) sendfile(r0, r0, &(0x7f0000000040)=0x4a, 0x28e2) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000000)) [ 471.195611][T19680] loop2: detected capacity change from 0 to 4 [ 471.202986][T19680] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 471.226572][T19682] loop1: detected capacity change from 0 to 1054 [ 471.246822][T19680] loop2: detected capacity change from 0 to 4 [ 471.254749][T19680] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 471.267122][T19682] EXT4-fs (loop1): bad geometry: block count 4096 exceeds size of device (527 blocks) 12:39:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 42) 12:39:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000101a10c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x30804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000059200)={{0x0, 0x5, 0x100000000, 0x4, 0x5, 0x100000001, 0x20, 0x20, 0x54, 0x46c4, 0x3bb6, 0xeae9, 0x0, 0xffff, 0x4cf74a17}}) r7 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a200)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {r6, r9}], 0x5, "d2cb9203239925"}) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x762, 0x733342) sendfile(r0, r0, 0x0, 0x3) 12:39:33 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000410000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 471.636174][T19689] loop3: detected capacity change from 0 to 4 [ 471.642381][T19689] FAULT_INJECTION: forcing a failure. [ 471.642381][T19689] name failslab, interval 1, probability 0, space 0, times 0 [ 471.654993][T19689] CPU: 0 PID: 19689 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 471.663538][T19689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.674113][T19689] Call Trace: [ 471.677387][T19689] dump_stack_lvl+0xd6/0x122 [ 471.682041][T19689] dump_stack+0x11/0x1b [ 471.682433][T19694] loop2: detected capacity change from 0 to 4 [ 471.686208][T19689] should_fail+0x23c/0x250 [ 471.686236][T19689] ? security_inode_alloc+0x30/0x180 [ 471.701991][T19689] __should_failslab+0x81/0x90 [ 471.706777][T19689] should_failslab+0x5/0x20 [ 471.710511][T19694] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 471.711321][T19689] kmem_cache_alloc+0x4f/0x320 [ 471.723881][T19689] security_inode_alloc+0x30/0x180 [ 471.729026][T19689] inode_init_always+0x20b/0x430 [ 471.733972][T19689] ? set_qf_name+0x230/0x230 [ 471.738597][T19689] new_inode_pseudo+0x6f/0x190 [ 471.743370][T19689] new_inode+0x21/0x100 [ 471.747525][T19689] __ext4_new_inode+0x13f/0x2fc0 [ 471.752480][T19689] ? avc_has_perm+0xd5/0x160 [ 471.757080][T19689] ext4_mkdir+0x28a/0x760 [ 471.761424][T19689] vfs_mkdir+0x2c3/0x3e0 [ 471.765776][T19689] do_mkdirat+0x12e/0x2c0 [ 471.770105][T19689] __x64_sys_mkdir+0x40/0x50 [ 471.774776][T19689] do_syscall_64+0x44/0xa0 [ 471.779237][T19689] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 471.785287][T19689] RIP: 0033:0x7f41f3448bf7 [ 471.789702][T19689] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 471.809319][T19689] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 471.817797][T19689] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 471.825829][T19689] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 471.834007][T19689] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 471.841985][T19689] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 471.849973][T19689] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 43) 12:39:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r1) getdents64(r1, 0x0, 0x2000) r2 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x6, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="f3269b86e1bf06091eba28494b229639a9cd65cafdf642aa6496c6ec349914b35e793ef2a1bf268952d8262a1e7034e94281feef203358f27c5115342534df031b1a9e4ddf38215d6883fb4c1346afaa56196b4260aa8be39619cecb247b0aa5e471e80a1fb55b627a5d591f21d1e4546787093996c61d61e859657caee3b84e310cec3ba894e3f8e0441c8859db85dd4bd1d678828731cecc5ad6a7969dcec61a0c458597021f3fb9904672a4ec741f52d34241e5", 0xb5, 0x3}, {&(0x7f00000003c0)="1e308f54bd9ae3be570ed1eb4247c4704272d9676ee9bc011550a074b19f67", 0x1f}], 0x40, &(0x7f0000000300)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @void}}}, {@size={'size', 0x3d, [0x39]}}, {@size={'size', 0x3d, [0x67, 0x1a, 0x33, 0x32]}}, {@huge_always}, {@huge_advise}, {@gid={'gid', 0x3d, 0xee01}}], [{@fowner_lt}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@dont_hash}, {@euid_lt={'euid<', 0xee00}}]}) close_range(r2, r0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401, 0x7, 0x0, 0x3, 0xe, 0x24, "e5efbac67d484898e2e800a8f8f2138fe5e547184a2ca7c4af488941037f21bdf2c94118c6293c9b640f37b8aee77284607fd59d0041ab378cb15e733c67b65a", "21cd98cbe2b7408cf3857caef193cb0ad21011e8d656105823a9ad4d2ca37c3708e410dc185d669fb42180bb45e90c7ce1699fbd5665da6cf498fc8bd27de946", "4c126cff194505cebf374fb33dcde46a97087d0a524eb510839da5cb3fc14b10", [0x40, 0x44]}) sendfile(r0, r0, 0x0, 0x3) 12:39:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000103b50c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 471.877405][T19700] loop1: detected capacity change from 0 to 1054 [ 471.884864][T19701] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 471.899670][T19700] EXT4-fs (loop1): bad geometry: block count 4100 exceeds size of device (527 blocks) [ 471.953043][T19704] loop3: detected capacity change from 0 to 4 [ 471.960815][T19704] FAULT_INJECTION: forcing a failure. [ 471.960815][T19704] name failslab, interval 1, probability 0, space 0, times 0 [ 471.973449][T19704] CPU: 0 PID: 19704 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 471.981897][T19704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.991951][T19704] Call Trace: [ 471.995223][T19704] dump_stack_lvl+0xd6/0x122 [ 471.999880][T19704] dump_stack+0x11/0x1b [ 472.004038][T19704] should_fail+0x23c/0x250 [ 472.008532][T19704] ? jbd2__journal_start+0xf7/0x3f0 [ 472.013739][T19704] __should_failslab+0x81/0x90 [ 472.018505][T19704] should_failslab+0x5/0x20 [ 472.023029][T19704] kmem_cache_alloc+0x4f/0x320 [ 472.027806][T19704] jbd2__journal_start+0xf7/0x3f0 [ 472.032845][T19704] __ext4_journal_start_sb+0x159/0x310 [ 472.038339][T19704] __ext4_new_inode+0xd95/0x2fc0 [ 472.043346][T19704] ext4_mkdir+0x28a/0x760 [ 472.047682][T19704] vfs_mkdir+0x2c3/0x3e0 [ 472.051937][T19704] do_mkdirat+0x12e/0x2c0 [ 472.056288][T19704] __x64_sys_mkdir+0x40/0x50 [ 472.060875][T19704] do_syscall_64+0x44/0xa0 [ 472.065295][T19704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.071268][T19704] RIP: 0033:0x7f41f3448bf7 [ 472.075678][T19704] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 472.095477][T19704] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 472.103899][T19704] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 472.111906][T19704] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 472.119884][T19704] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 472.127855][T19704] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 472.135820][T19704] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 472.143831][T19704] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory 12:39:33 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000011000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) ioctl$FIONCLEX(r0, 0x5450) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000031c0)='ns/user\x00') ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/8250_core', 0x8202, 0x103) sendfile(r1, r4, &(0x7f0000000040)=0x7, 0x1) [ 472.157108][T19710] loop2: detected capacity change from 0 to 4 [ 472.164501][T19710] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000103d70c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 472.206685][T19710] loop2: detected capacity change from 0 to 4 [ 472.210141][T19715] loop1: detected capacity change from 0 to 1054 [ 472.219485][T19710] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 472.219989][T19715] EXT4-fs (loop1): bad geometry: block count 4352 exceeds size of device (527 blocks) [ 472.313236][T19718] loop2: detected capacity change from 0 to 4 [ 472.320260][T19718] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 472.367730][T19718] loop2: detected capacity change from 0 to 4 12:39:33 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x1c1380) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xc140, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r0, r1, 0x0, 0x3) 12:39:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 44) [ 472.522809][T19721] loop3: detected capacity change from 0 to 4 [ 472.555698][T19721] FAULT_INJECTION: forcing a failure. [ 472.555698][T19721] name failslab, interval 1, probability 0, space 0, times 0 [ 472.568352][T19721] CPU: 0 PID: 19721 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 472.577033][T19721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.587256][T19721] Call Trace: [ 472.590581][T19721] dump_stack_lvl+0xd6/0x122 [ 472.595256][T19721] dump_stack+0x11/0x1b [ 472.599417][T19721] should_fail+0x23c/0x250 [ 472.603847][T19721] ? sidtab_sid2str_get+0xb0/0x140 [ 472.609081][T19721] __should_failslab+0x81/0x90 [ 472.613856][T19721] should_failslab+0x5/0x20 [ 472.618374][T19721] __kmalloc_track_caller+0x6d/0x370 [ 472.623799][T19721] kmemdup+0x21/0x50 [ 472.627785][T19721] sidtab_sid2str_get+0xb0/0x140 [ 472.632787][T19721] security_sid_to_context_core+0x1d0/0x2d0 [ 472.638699][T19721] security_sid_to_context_force+0x2f/0x40 [ 472.644524][T19721] selinux_inode_init_security+0x4e4/0x590 [ 472.650356][T19721] security_inode_init_security+0xe4/0x260 [ 472.656372][T19721] ? ext4_init_security+0x40/0x40 [ 472.661478][T19721] ext4_init_security+0x30/0x40 [ 472.666335][T19721] __ext4_new_inode+0x29a3/0x2fc0 [ 472.671491][T19721] ext4_mkdir+0x28a/0x760 [ 472.675867][T19721] vfs_mkdir+0x2c3/0x3e0 [ 472.680182][T19721] do_mkdirat+0x12e/0x2c0 [ 472.684581][T19721] __x64_sys_mkdir+0x40/0x50 [ 472.689167][T19721] do_syscall_64+0x44/0xa0 [ 472.693595][T19721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 472.699505][T19721] RIP: 0033:0x7f41f3448bf7 [ 472.703913][T19721] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 472.723630][T19721] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 472.732043][T19721] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 472.740013][T19721] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 472.747981][T19721] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 472.756001][T19721] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 472.763969][T19721] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000240)=""/134, 0x86}, {&(0x7f0000000440)=""/208, 0xd0}], 0x2, 0x7, 0x9) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:34 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000012000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001fffe0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x75f, 0x513b82) sendfile(r0, r0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000001c0)=0x8) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000100)={{0xffffffffffffffff, 0x2, 0x33, 0x1, 0x3d4}, 0x7, 0x219ea277}) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x280800, 0xd9feed506ed072f8) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, 0x0) 12:39:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 472.777428][T19707] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 45) [ 472.841917][T19730] loop1: detected capacity change from 0 to 1054 [ 472.855881][T19734] loop3: detected capacity change from 0 to 4 [ 472.864884][T19737] loop2: detected capacity change from 0 to 4 [ 472.873127][T19730] EXT4-fs (loop1): bad geometry: block count 4608 exceeds size of device (527 blocks) [ 472.873223][T19737] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x80702) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sendfile(r1, r1, &(0x7f0000000000)=0xf8, 0x800) sendfile(r0, r0, 0x0, 0x3) [ 472.891258][T19740] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 472.907948][T19741] loop2: detected capacity change from 0 to 4 [ 472.910423][T19734] FAULT_INJECTION: forcing a failure. [ 472.910423][T19734] name failslab, interval 1, probability 0, space 0, times 0 [ 472.919306][T19741] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 472.926669][T19734] CPU: 1 PID: 19734 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 472.942892][T19734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.953076][T19734] Call Trace: [ 472.956341][T19734] dump_stack_lvl+0xd6/0x122 [ 472.960987][T19734] dump_stack+0x11/0x1b [ 472.965226][T19734] should_fail+0x23c/0x250 [ 472.969643][T19734] ? kcalloc+0x32/0x50 [ 472.974205][T19734] __should_failslab+0x81/0x90 [ 472.979028][T19734] should_failslab+0x5/0x20 [ 472.983584][T19734] __kmalloc+0x6f/0x370 [ 472.987729][T19734] ? __crc32c_le_base+0x250/0x350 [ 472.992825][T19734] kcalloc+0x32/0x50 [ 472.996719][T19734] ext4_find_extent+0x21c/0x7f0 [ 473.001560][T19734] ext4_ext_map_blocks+0x115/0x20a0 [ 473.006750][T19734] ? ext4_es_lookup_extent+0x221/0x500 [ 473.012255][T19734] ext4_map_blocks+0x1cf/0xf00 [ 473.017022][T19734] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 473.022681][T19734] ext4_getblk+0xc6/0x3e0 [ 473.027022][T19734] ext4_bread+0x28/0x100 [ 473.031251][T19734] ext4_append+0xd1/0x1c0 [ 473.035590][T19734] ext4_init_new_dir+0x177/0x500 [ 473.040520][T19734] ext4_mkdir+0x329/0x760 [ 473.044864][T19734] vfs_mkdir+0x2c3/0x3e0 [ 473.049118][T19734] do_mkdirat+0x12e/0x2c0 [ 473.053477][T19734] __x64_sys_mkdir+0x40/0x50 [ 473.058056][T19734] do_syscall_64+0x44/0xa0 [ 473.062536][T19734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.068420][T19734] RIP: 0033:0x7f41f3448bf7 [ 473.072908][T19734] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 473.092501][T19734] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 473.100910][T19734] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 473.108895][T19734] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 473.116924][T19734] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 473.124895][T19734] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 473.132859][T19734] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:34 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000412000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="2000000000010fff0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:34 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) syz_open_dev$sg(&(0x7f0000000000), 0x4, 0x210400) 12:39:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) sendfile(r0, r0, 0x0, 0x3) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 473.151791][T19734] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 473.176932][T19747] loop1: detected capacity change from 0 to 1054 [ 473.185535][T19747] EXT4-fs (loop1): bad geometry: block count 4612 exceeds size of device (527 blocks) [ 473.253763][T19759] loop2: detected capacity change from 0 to 4 [ 473.261225][T19759] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 473.296990][T19759] loop2: detected capacity change from 0 to 4 12:39:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r2) getdents64(r2, 0x0, 0x2000) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7, 0x5, 0x80, 0x3, 0x0, 0x6, 0x42120, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x4, 0xffffffffffffff81, 0x3, 0x4, 0x9, 0x200, 0xbd4, 0x0, 0x7, 0x0, 0x7f}, 0x0, 0x3, r2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 473.737964][T19760] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) fstat(r2, &(0x7f0000000100)) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000005, 0x50, r1, 0x9) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x19a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/1725], 0x6bd) 12:39:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 46) 12:39:35 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000414000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:35 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001feff0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 473.804901][T19770] loop1: detected capacity change from 0 to 1054 [ 473.812101][T19769] loop2: detected capacity change from 0 to 4 [ 473.813834][T19772] loop3: detected capacity change from 0 to 4 [ 473.824586][T19769] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 473.831681][T19772] FAULT_INJECTION: forcing a failure. [ 473.831681][T19772] name failslab, interval 1, probability 0, space 0, times 0 [ 473.845236][T19772] CPU: 0 PID: 19772 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 473.853676][T19772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.863795][T19772] Call Trace: [ 473.867081][T19772] dump_stack_lvl+0xd6/0x122 [ 473.868824][T19774] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 473.871729][T19772] dump_stack+0x11/0x1b [ 473.888787][T19772] should_fail+0x23c/0x250 [ 473.893209][T19772] ? __es_insert_extent+0x546/0xe80 [ 473.898482][T19772] __should_failslab+0x81/0x90 [ 473.903330][T19772] should_failslab+0x5/0x20 [ 473.907946][T19772] kmem_cache_alloc+0x4f/0x320 [ 473.912839][T19772] __es_insert_extent+0x546/0xe80 [ 473.918020][T19772] ext4_es_insert_extent+0x1cb/0x19c0 [ 473.923428][T19772] ext4_ext_map_blocks+0xff6/0x20a0 [ 473.928720][T19772] ext4_map_blocks+0x1cf/0xf00 [ 473.933522][T19772] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 473.939191][T19772] ext4_getblk+0xc6/0x3e0 [ 473.943525][T19772] ext4_bread+0x28/0x100 [ 473.947792][T19772] ext4_append+0xd1/0x1c0 [ 473.952131][T19772] ext4_init_new_dir+0x177/0x500 [ 473.957144][T19772] ext4_mkdir+0x329/0x760 [ 473.961559][T19772] vfs_mkdir+0x2c3/0x3e0 [ 473.965990][T19772] do_mkdirat+0x12e/0x2c0 [ 473.970354][T19772] __x64_sys_mkdir+0x40/0x50 [ 473.974973][T19772] do_syscall_64+0x44/0xa0 [ 473.979396][T19772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 473.985293][T19772] RIP: 0033:0x7f41f3448bf7 [ 473.989710][T19772] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 474.009460][T19772] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 474.018006][T19772] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 474.025976][T19772] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 474.033972][T19772] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 474.041987][T19772] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:39:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75e, 0x0) sendfile(r0, r0, 0x0, 0x1000000) 12:39:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000fff0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:35 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000041a000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x6, 0x143b82) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x6, 0xf, 0x0, "40980ef564b121afe1d318bfd31f832d54d5fbd1c68e5a5e54d39800d103bc8df4682da8ffb7d798a6a5e9ee0b16898de48fd422d9bb9aee9ea3f116ec07c57a", "506451925dbc5f2a3cfbab4b62990776def7c03a279fc37161b295c88eeb4ab8f873bf0709732a1414bbc8951fac242009a8faeb0aec7fbf23201f0165e0c596", "c23c1eea8106d5b981c64a7e22070c7d3dcb1af9f214ed94281fad6ddcfdfee3", [0x6, 0x6]}) [ 474.049959][T19772] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 474.058732][T19770] EXT4-fs (loop1): bad geometry: block count 5124 exceeds size of device (527 blocks) [ 474.059416][T19772] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 474.088562][T19769] loop2: detected capacity change from 0 to 4 12:39:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 47) 12:39:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r1) getdents64(r1, 0x0, 0x2000) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) sendfile(r0, r0, 0x0, 0x3) [ 474.149546][T19788] loop1: detected capacity change from 0 to 1054 [ 474.159260][T19788] EXT4-fs (loop1): bad geometry: block count 6660 exceeds size of device (527 blocks) [ 474.179340][T19791] loop3: detected capacity change from 0 to 4 [ 474.186186][T19791] FAULT_INJECTION: forcing a failure. [ 474.186186][T19791] name failslab, interval 1, probability 0, space 0, times 0 [ 474.198862][T19791] CPU: 1 PID: 19791 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 474.207313][T19791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.217439][T19791] Call Trace: [ 474.220823][T19791] dump_stack_lvl+0xd6/0x122 [ 474.225434][T19791] dump_stack+0x11/0x1b [ 474.229656][T19791] should_fail+0x23c/0x250 [ 474.234089][T19791] ? kcalloc+0x32/0x50 [ 474.238265][T19791] __should_failslab+0x81/0x90 [ 474.243117][T19791] should_failslab+0x5/0x20 [ 474.247632][T19791] __kmalloc+0x6f/0x370 [ 474.251884][T19791] kcalloc+0x32/0x50 [ 474.255783][T19791] ext4_find_extent+0x21c/0x7f0 [ 474.260644][T19791] ? kfree+0xf8/0x1f0 [ 474.264646][T19791] ext4_ext_map_blocks+0x115/0x20a0 [ 474.269910][T19791] ext4_map_blocks+0x71e/0xf00 [ 474.274714][T19791] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 474.280353][T19791] ext4_getblk+0xc6/0x3e0 [ 474.284685][T19791] ext4_bread+0x28/0x100 [ 474.288948][T19791] ext4_append+0xd1/0x1c0 [ 474.293282][T19791] ext4_init_new_dir+0x177/0x500 [ 474.298253][T19791] ext4_mkdir+0x329/0x760 [ 474.302622][T19791] vfs_mkdir+0x2c3/0x3e0 [ 474.306934][T19791] do_mkdirat+0x12e/0x2c0 [ 474.311265][T19791] __x64_sys_mkdir+0x40/0x50 [ 474.315861][T19791] do_syscall_64+0x44/0xa0 [ 474.320280][T19791] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.326391][T19791] RIP: 0033:0x7f41f3448bf7 [ 474.330818][T19791] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 474.333965][T19797] loop2: detected capacity change from 0 to 4 [ 474.350439][T19791] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 474.350465][T19791] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 474.350512][T19791] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 474.350525][T19791] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 474.350538][T19791] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 474.396965][T19791] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 474.417355][T19797] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:36 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000041c000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) sendfile(r0, r0, 0x0, 0x3) 12:39:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000a000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 48) 12:39:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r2) getdents64(r2, 0x0, 0x2000) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000240)=""/110) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44386, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x2000) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0x3, 0x2f, 0x0, 0x0, 0x9, 0x6212, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xdfcada75f5988720, @perf_bp={&(0x7f0000000180), 0x2}, 0x4000, 0x1, 0x55, 0x5, 0x9, 0x1, 0x93, 0x0, 0x1000}, 0x0, 0x10, 0xffffffffffffffff, 0x1) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x80000000, 0x7, 0x2, 0x736, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 474.739744][T19807] loop3: detected capacity change from 0 to 4 [ 474.739779][T19806] loop2: detected capacity change from 0 to 4 [ 474.750945][T19807] FAULT_INJECTION: forcing a failure. [ 474.750945][T19807] name failslab, interval 1, probability 0, space 0, times 0 [ 474.756243][T19806] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 474.764551][T19807] CPU: 0 PID: 19807 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 474.780872][T19807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.791075][T19807] Call Trace: [ 474.794369][T19807] dump_stack_lvl+0xd6/0x122 [ 474.799045][T19807] dump_stack+0x11/0x1b [ 474.803209][T19807] should_fail+0x23c/0x250 [ 474.807618][T19807] ? kcalloc+0x32/0x50 [ 474.811678][T19807] __should_failslab+0x81/0x90 [ 474.816437][T19807] should_failslab+0x5/0x20 [ 474.821054][T19807] __kmalloc+0x6f/0x370 [ 474.825203][T19807] kcalloc+0x32/0x50 [ 474.829095][T19807] ext4_find_extent+0x21c/0x7f0 [ 474.834014][T19807] ? kfree+0xf8/0x1f0 [ 474.838009][T19807] ext4_ext_map_blocks+0x115/0x20a0 [ 474.843398][T19807] ext4_map_blocks+0x71e/0xf00 [ 474.848229][T19807] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 474.853875][T19807] ext4_getblk+0xc6/0x3e0 [ 474.858274][T19807] ext4_bread+0x28/0x100 [ 474.862506][T19807] ext4_append+0xd1/0x1c0 [ 474.866895][T19807] ext4_init_new_dir+0x177/0x500 [ 474.871885][T19807] ext4_mkdir+0x329/0x760 [ 474.876295][T19807] vfs_mkdir+0x2c3/0x3e0 [ 474.880634][T19807] do_mkdirat+0x12e/0x2c0 [ 474.884953][T19807] __x64_sys_mkdir+0x40/0x50 [ 474.889561][T19807] do_syscall_64+0x44/0xa0 [ 474.893973][T19807] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 474.899859][T19807] RIP: 0033:0x7f41f3448bf7 [ 474.904331][T19807] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 474.924016][T19807] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 474.932418][T19807] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 474.940438][T19807] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 474.948419][T19807] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 474.956378][T19807] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 474.964365][T19807] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 474.975760][ T23] audit: type=1400 audit(1635856776.384:245): avc: denied { setattr } for pid=19803 comm="syz-executor.0" name="loop7" dev="devtmpfs" ino=107 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 475.000647][T19808] loop1: detected capacity change from 0 to 1054 [ 475.008481][T19808] EXT4-fs (loop1): bad geometry: block count 7172 exceeds size of device (527 blocks) [ 475.029130][T19806] loop2: detected capacity change from 0 to 4 12:39:36 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_batadv\x00'}) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="dc000000530400022abd7000ffdbdf25e422934f118ae3a005336144ede815439bb53385e070c4f1dea665475a3ac1051fa41c2f1790dd8e799b26b2ada6333a0d3d807cb9e1c2b76d6831fce465f3cd5250624a97db4b11518690676f4c1257f153626504ddbfe79b9aace1a209a44a4c2fa5f27a424b81fcdf9fdd7f61943a8b396dd5d5554a30a9fb616aaac917956d46cb197595e7ef9addfbb10ec3576442cf12041b109fbf8d5bdc23afb7a8d3a4a39522f0b74d6a81023c9fb2251ad39ab4be63913e0d2bfedef80245de5c3816f0fdbf2043c16422000000"], 0xdc}, 0x1, 0x0, 0x0, 0x4008080}, 0x20000000) sendfile(r1, r1, 0x0, 0x3) 12:39:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 49) 12:39:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x75f, 0x143382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000100)={0x50000004}) ftruncate(r0, 0x80000001) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 475.036300][T19813] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 475.049845][T19806] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 475.077934][T19819] loop3: detected capacity change from 0 to 4 [ 475.084323][T19819] FAULT_INJECTION: forcing a failure. [ 475.084323][T19819] name failslab, interval 1, probability 0, space 0, times 0 [ 475.096987][T19819] CPU: 0 PID: 19819 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 475.105438][T19819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.115608][T19819] Call Trace: [ 475.118888][T19819] dump_stack_lvl+0xd6/0x122 [ 475.123491][T19819] dump_stack+0x11/0x1b [ 475.127658][T19819] should_fail+0x23c/0x250 [ 475.132149][T19819] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 475.137435][T19819] __should_failslab+0x81/0x90 [ 475.142198][T19819] should_failslab+0x5/0x20 [ 475.146774][T19819] kmem_cache_alloc+0x4f/0x320 [ 475.151583][T19819] ext4_mb_new_blocks+0x73e/0x1ee0 [ 475.156764][T19819] ? kcalloc+0x32/0x50 [ 475.160828][T19819] ? ext4_find_extent+0x6cf/0x7f0 [ 475.165855][T19819] ? ext4_ext_search_right+0x300/0x540 [ 475.171320][T19819] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 475.177043][T19819] ext4_ext_map_blocks+0x15f4/0x20a0 [ 475.182367][T19819] ext4_map_blocks+0x71e/0xf00 [ 475.187191][T19819] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 475.192917][T19819] ext4_getblk+0xc6/0x3e0 [ 475.197262][T19819] ext4_bread+0x28/0x100 [ 475.201521][T19819] ext4_append+0xd1/0x1c0 [ 475.205988][T19819] ext4_init_new_dir+0x177/0x500 [ 475.211013][T19819] ext4_mkdir+0x329/0x760 [ 475.215347][T19819] vfs_mkdir+0x2c3/0x3e0 [ 475.219678][T19819] do_mkdirat+0x12e/0x2c0 [ 475.224028][T19819] __x64_sys_mkdir+0x40/0x50 [ 475.228626][T19819] do_syscall_64+0x44/0xa0 [ 475.233048][T19819] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 475.238963][T19819] RIP: 0033:0x7f41f3448bf7 [ 475.243388][T19819] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 475.262999][T19819] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 475.271488][T19819] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 475.279547][T19819] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 12:39:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100020c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:36 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000001d000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 475.287555][T19819] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 475.295523][T19819] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 475.303571][T19819] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 475.324229][T19823] loop1: detected capacity change from 0 to 1054 [ 475.350586][T19823] EXT4-fs (loop1): bad geometry: block count 7424 exceeds size of device (527 blocks) [ 475.376810][T19829] loop2: detected capacity change from 0 to 4 [ 475.384285][T19829] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 50) 12:39:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100030c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 475.416913][T19829] loop2: detected capacity change from 0 to 4 [ 475.423539][T19829] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:36 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000041e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 475.479886][T19832] loop2: detected capacity change from 0 to 4 [ 475.487311][T19832] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100040c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 475.526645][T19832] loop2: detected capacity change from 0 to 4 [ 475.533237][T19832] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 475.543717][T19834] loop1: detected capacity change from 0 to 1054 [ 475.561701][T19834] EXT4-fs (loop1): bad geometry: block count 7684 exceeds size of device (527 blocks) 12:39:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:37 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000020000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 475.675028][T19838] loop2: detected capacity change from 0 to 4 [ 475.682199][T19838] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 475.691349][T19840] loop1: detected capacity change from 0 to 1054 [ 475.704688][T19840] EXT4-fs (loop1): bad geometry: block count 8192 exceeds size of device (527 blocks) [ 475.718462][T19838] loop2: detected capacity change from 0 to 4 [ 475.725043][T19838] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 475.816259][T19844] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 475.846573][T19842] loop3: detected capacity change from 0 to 4 [ 475.853596][T19842] FAULT_INJECTION: forcing a failure. [ 475.853596][T19842] name failslab, interval 1, probability 0, space 0, times 0 [ 475.866339][T19842] CPU: 1 PID: 19842 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 475.874810][T19842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.884871][T19842] Call Trace: [ 475.888202][T19842] dump_stack_lvl+0xd6/0x122 [ 475.892810][T19842] dump_stack+0x11/0x1b [ 475.896995][T19842] should_fail+0x23c/0x250 [ 475.901427][T19842] ? ext4_mb_new_blocks+0x73e/0x1ee0 [ 475.906721][T19842] __should_failslab+0x81/0x90 [ 475.911492][T19842] should_failslab+0x5/0x20 [ 475.916079][T19842] kmem_cache_alloc+0x4f/0x320 [ 475.920852][T19842] ext4_mb_new_blocks+0x73e/0x1ee0 [ 475.926065][T19842] ? kcalloc+0x32/0x50 [ 475.930174][T19842] ? ext4_find_extent+0x6cf/0x7f0 [ 475.935209][T19842] ? ext4_ext_search_right+0x300/0x540 [ 475.940685][T19842] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 475.946456][T19842] ext4_ext_map_blocks+0x15f4/0x20a0 [ 475.951765][T19842] ext4_map_blocks+0x71e/0xf00 [ 475.956651][T19842] ? __ext4_mark_inode_dirty+0x502/0x5f0 [ 475.962295][T19842] ext4_getblk+0xc6/0x3e0 [ 475.966641][T19842] ext4_bread+0x28/0x100 [ 475.970979][T19842] ext4_append+0xd1/0x1c0 [ 475.975321][T19842] ext4_init_new_dir+0x177/0x500 [ 475.980271][T19842] ext4_mkdir+0x329/0x760 [ 475.984750][T19842] vfs_mkdir+0x2c3/0x3e0 [ 475.989025][T19842] do_mkdirat+0x12e/0x2c0 [ 475.993366][T19842] __x64_sys_mkdir+0x40/0x50 [ 475.997961][T19842] do_syscall_64+0x44/0xa0 [ 476.002503][T19842] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.008409][T19842] RIP: 0033:0x7f41f3448bf7 [ 476.012887][T19842] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 476.032557][T19842] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 476.040977][T19842] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 476.048964][T19842] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 476.056989][T19842] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff 12:39:37 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000002e000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100050c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 476.064972][T19842] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 476.072953][T19842] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 476.114634][T19846] loop1: detected capacity change from 0 to 1054 [ 476.123265][T19848] loop2: detected capacity change from 0 to 4 [ 476.130426][T19848] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 51) [ 476.156138][T19846] EXT4-fs (loop1): bad geometry: block count 11776 exceeds size of device (527 blocks) [ 476.166209][T19848] loop2: detected capacity change from 0 to 4 [ 476.173019][T19848] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 476.189183][T19850] loop3: detected capacity change from 0 to 4 [ 476.205979][T19850] FAULT_INJECTION: forcing a failure. [ 476.205979][T19850] name failslab, interval 1, probability 0, space 0, times 0 [ 476.218659][T19850] CPU: 1 PID: 19850 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 476.227088][T19850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.237146][T19850] Call Trace: [ 476.240437][T19850] dump_stack_lvl+0xd6/0x122 [ 476.245045][T19850] dump_stack+0x11/0x1b [ 476.249214][T19850] should_fail+0x23c/0x250 [ 476.253724][T19850] ? __es_insert_extent+0x546/0xe80 [ 476.258941][T19850] __should_failslab+0x81/0x90 [ 476.263804][T19850] should_failslab+0x5/0x20 [ 476.268478][T19850] kmem_cache_alloc+0x4f/0x320 [ 476.273256][T19850] __es_insert_extent+0x546/0xe80 [ 476.278358][T19850] ? ext4_ext_map_blocks+0x1128/0x20a0 [ 476.283876][T19850] ext4_es_insert_extent+0x1cb/0x19c0 [ 476.289293][T19850] ext4_map_blocks+0xa5d/0xf00 [ 476.294069][T19850] ext4_getblk+0xc6/0x3e0 [ 476.298408][T19850] ext4_bread+0x28/0x100 [ 476.302655][T19850] ext4_append+0xd1/0x1c0 [ 476.307001][T19850] ext4_init_new_dir+0x177/0x500 [ 476.311952][T19850] ext4_mkdir+0x329/0x760 [ 476.316344][T19850] vfs_mkdir+0x2c3/0x3e0 [ 476.320598][T19850] do_mkdirat+0x12e/0x2c0 [ 476.324935][T19850] __x64_sys_mkdir+0x40/0x50 [ 476.329575][T19850] do_syscall_64+0x44/0xa0 [ 476.334046][T19850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.340046][T19850] RIP: 0033:0x7f41f3448bf7 [ 476.344475][T19850] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 476.364113][T19850] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 476.372531][T19850] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f3448bf7 [ 476.380569][T19850] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 476.388551][T19850] RBP: 00007f41f11c0040 R08: 0000000000000000 R09: ffffffffffffffff [ 476.396577][T19850] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:39:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100060c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:37 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000003f000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 476.404649][T19850] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 476.453749][T19852] loop2: detected capacity change from 0 to 4 [ 476.463562][T19852] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 476.473079][T19854] loop1: detected capacity change from 0 to 1054 [ 476.490702][T19854] EXT4-fs (loop1): bad geometry: block count 16128 exceeds size of device (527 blocks) 12:39:37 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100070c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 476.515036][T19850] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:39:38 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000040000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 476.576215][T19859] loop2: detected capacity change from 0 to 4 [ 476.583301][T19859] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 476.607139][T19862] loop2: detected capacity change from 0 to 4 [ 476.613849][T19861] loop1: detected capacity change from 0 to 1054 12:39:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 52) [ 476.626077][T19862] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 476.662394][T19865] loop3: detected capacity change from 0 to 4 12:39:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100080c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 476.669083][T19861] EXT4-fs (loop1): bad geometry: block count 16384 exceeds size of device (527 blocks) [ 476.693496][T19865] FAULT_INJECTION: forcing a failure. [ 476.693496][T19865] name failslab, interval 1, probability 0, space 0, times 0 [ 476.706230][T19865] CPU: 0 PID: 19865 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 476.714682][T19865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.724777][T19865] Call Trace: [ 476.728055][T19865] dump_stack_lvl+0xd6/0x122 [ 476.732668][T19865] dump_stack+0x11/0x1b [ 476.736841][T19865] should_fail+0x23c/0x250 [ 476.741356][T19865] ? strndup_user+0x64/0xa0 [ 476.745968][T19865] __should_failslab+0x81/0x90 [ 476.750921][T19865] should_failslab+0x5/0x20 [ 476.755443][T19865] __kmalloc_track_caller+0x6d/0x370 [ 476.760736][T19865] ? save_fpregs_to_fpstate+0xf5/0x140 [ 476.766232][T19865] memdup_user+0x22/0xb0 [ 476.770508][T19865] strndup_user+0x64/0xa0 [ 476.774854][T19865] __se_sys_mount+0x4e/0x2f0 [ 476.779486][T19865] ? __this_cpu_preempt_check+0x18/0x20 [ 476.785042][T19865] ? switch_fpu_return+0xc9/0x190 [ 476.790075][T19865] __x64_sys_mount+0x63/0x70 [ 476.794685][T19865] do_syscall_64+0x44/0xa0 [ 476.799113][T19865] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 476.805060][T19865] RIP: 0033:0x7f41f344b01a [ 476.809556][T19865] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 476.829177][T19865] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 476.837684][T19865] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 476.845760][T19865] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 476.853756][T19865] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 476.861834][T19865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:39:38 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000052000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 476.869841][T19865] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 476.880848][T19867] loop2: detected capacity change from 0 to 4 [ 476.888327][T19867] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 53) [ 476.931725][T19869] loop1: detected capacity change from 0 to 1054 [ 476.941516][T19867] loop2: detected capacity change from 0 to 4 [ 476.947914][T19869] EXT4-fs (loop1): bad geometry: block count 20992 exceeds size of device (527 blocks) [ 476.984194][T19871] loop3: detected capacity change from 0 to 4 [ 476.990970][T19871] FAULT_INJECTION: forcing a failure. [ 476.990970][T19871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.004206][T19871] CPU: 0 PID: 19871 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 477.012667][T19871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.022839][T19871] Call Trace: [ 477.026240][T19871] dump_stack_lvl+0xd6/0x122 [ 477.030868][T19871] dump_stack+0x11/0x1b [ 477.035066][T19871] should_fail+0x23c/0x250 [ 477.039562][T19871] should_fail_usercopy+0x16/0x20 [ 477.044675][T19871] _copy_from_user+0x1c/0xd0 [ 477.049335][T19871] memdup_user+0x5b/0xb0 [ 477.053724][T19871] strndup_user+0x64/0xa0 [ 477.058072][T19871] __se_sys_mount+0x4e/0x2f0 [ 477.062672][T19871] ? debug_smp_processor_id+0x18/0x20 [ 477.068081][T19871] __x64_sys_mount+0x63/0x70 [ 477.072728][T19871] do_syscall_64+0x44/0xa0 [ 477.077220][T19871] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 477.083202][T19871] RIP: 0033:0x7f41f344b01a [ 477.087726][T19871] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 477.107398][T19871] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 477.115817][T19871] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 477.123804][T19871] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 477.131783][T19871] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 477.139844][T19871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 477.147889][T19871] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100090c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:38 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000000005c000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 54) [ 477.237217][T19873] loop1: detected capacity change from 0 to 1054 [ 477.263725][T19875] loop2: detected capacity change from 0 to 4 [ 477.270887][T19875] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 477.277473][T19873] EXT4-fs (loop1): bad geometry: block count 23552 exceeds size of device (527 blocks) [ 477.289553][T19877] loop3: detected capacity change from 0 to 4 [ 477.296835][T19875] loop2: detected capacity change from 0 to 4 [ 477.303376][T19875] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 477.311854][T19877] FAULT_INJECTION: forcing a failure. [ 477.311854][T19877] name failslab, interval 1, probability 0, space 0, times 0 [ 477.324530][T19877] CPU: 0 PID: 19877 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 477.332975][T19877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.343234][T19877] Call Trace: [ 477.346519][T19877] dump_stack_lvl+0xd6/0x122 [ 477.351165][T19877] dump_stack+0x11/0x1b [ 477.355409][T19877] should_fail+0x23c/0x250 [ 477.359887][T19877] ? strndup_user+0x64/0xa0 [ 477.364429][T19877] __should_failslab+0x81/0x90 [ 477.369278][T19877] should_failslab+0x5/0x20 [ 477.373794][T19877] __kmalloc_track_caller+0x6d/0x370 [ 477.379095][T19877] memdup_user+0x22/0xb0 [ 477.383479][T19877] strndup_user+0x64/0xa0 [ 477.387902][T19877] __se_sys_mount+0x91/0x2f0 [ 477.392548][T19877] ? __this_cpu_preempt_check+0x18/0x20 [ 477.398192][T19877] ? switch_fpu_return+0xc9/0x190 [ 477.403226][T19877] __x64_sys_mount+0x63/0x70 [ 477.407822][T19877] do_syscall_64+0x44/0xa0 [ 477.412303][T19877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 477.418209][T19877] RIP: 0033:0x7f41f344b01a [ 477.422673][T19877] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 477.442288][T19877] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 477.450710][T19877] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 477.458700][T19877] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 477.466677][T19877] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 477.474696][T19877] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 477.482754][T19877] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000064000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 477.585462][T19879] loop2: detected capacity change from 0 to 4 [ 477.592448][T19879] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 477.617377][T19883] loop1: detected capacity change from 0 to 1054 [ 477.625360][T19879] loop2: detected capacity change from 0 to 4 [ 477.631907][T19879] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 477.633993][T19883] EXT4-fs (loop1): bad geometry: block count 25600 exceeds size of device (527 blocks) 12:39:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000b0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000081000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 477.747260][T19886] loop2: detected capacity change from 0 to 4 [ 477.754351][T19886] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 477.775157][T19888] loop1: detected capacity change from 0 to 1054 [ 477.796902][T19886] loop2: detected capacity change from 0 to 4 [ 477.798005][T19888] EXT4-fs (loop1): bad geometry: block count 33024 exceeds size of device (527 blocks) [ 477.813668][T19886] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 55) [ 477.904812][T19890] loop3: detected capacity change from 0 to 4 [ 477.916960][T19890] FAULT_INJECTION: forcing a failure. [ 477.916960][T19890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 477.930058][T19890] CPU: 0 PID: 19890 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 477.938507][T19890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.948565][T19890] Call Trace: [ 477.951849][T19890] dump_stack_lvl+0xd6/0x122 [ 477.956454][T19890] dump_stack+0x11/0x1b [ 477.960639][T19890] should_fail+0x23c/0x250 [ 477.965072][T19890] should_fail_usercopy+0x16/0x20 [ 477.970160][T19890] _copy_from_user+0x1c/0xd0 [ 477.974763][T19890] memdup_user+0x5b/0xb0 [ 477.979087][T19890] strndup_user+0x64/0xa0 [ 477.983360][T19893] loop2: detected capacity change from 0 to 4 [ 477.983443][T19890] __se_sys_mount+0x91/0x2f0 [ 477.994071][T19890] ? __this_cpu_preempt_check+0x18/0x20 [ 477.999636][T19890] ? switch_fpu_return+0xc9/0x190 [ 478.004786][T19890] __x64_sys_mount+0x63/0x70 [ 478.009411][T19890] do_syscall_64+0x44/0xa0 [ 478.013833][T19890] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.014149][T19893] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.019740][T19890] RIP: 0033:0x7f41f344b01a [ 478.019760][T19890] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:39:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000089000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 478.051693][T19890] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 478.060229][T19890] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 478.068289][T19890] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 478.076304][T19890] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 478.084364][T19890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 478.092340][T19890] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000d0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 478.114879][T19895] loop1: detected capacity change from 0 to 1054 12:39:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [], 0x0, "45146335e226df"}) r1 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "45146335e226df"}) r4 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "45146335e226df"}) r7 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x0, "45146335e226df"}) r10 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000527c0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xc8, "08dda5901ea134"}) r14 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000537c0)={0x80000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r5, r9}, {0x0, r12}, {0x0, r13}, {r15}], 0x0, "21f9962f8a1ae0"}) 12:39:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendfile(r0, r0, 0x0, 0x3) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = dup(r1) lseek(r2, 0x101, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000140)=0x0) mount$9p_rdma(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2000410, &(0x7f0000001200)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@version_9p2000}, {@common=@dfltuid={'dfltuid', 0x3d, r3}}], [{@obj_type={'obj_type', 0x3d, '/dev/loop#\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/loop#\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/loop#\x00'}}, {@audit}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, '\\'}}, {@appraise_type}]}}) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000000)) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0x12, @unused=[0x7, 0x4, 0xd4, 0x3], @name="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"}) [ 478.157996][T19895] EXT4-fs (loop1): bad geometry: block count 35072 exceeds size of device (527 blocks) [ 478.172362][T19897] loop2: detected capacity change from 0 to 4 [ 478.180025][T19897] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 56) 12:39:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000d8000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 478.226819][T19897] loop2: detected capacity change from 0 to 4 [ 478.233392][T19897] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.296427][T19906] loop1: detected capacity change from 0 to 1054 [ 478.315740][T19906] EXT4-fs (loop1): bad geometry: block count 55296 exceeds size of device (527 blocks) [ 478.346213][T19907] loop3: detected capacity change from 0 to 4 [ 478.353580][T19907] FAULT_INJECTION: forcing a failure. [ 478.353580][T19907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 478.366678][T19907] CPU: 1 PID: 19907 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 478.375122][T19907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.385258][T19907] Call Trace: [ 478.388558][T19907] dump_stack_lvl+0xd6/0x122 [ 478.393228][T19907] dump_stack+0x11/0x1b [ 478.397510][T19907] should_fail+0x23c/0x250 [ 478.401985][T19907] should_fail_usercopy+0x16/0x20 [ 478.407019][T19907] _copy_from_user+0x1c/0xd0 [ 478.411649][T19907] memdup_user+0x5b/0xb0 [ 478.415908][T19907] strndup_user+0x64/0xa0 [ 478.420250][T19907] __se_sys_mount+0x91/0x2f0 [ 478.424841][T19907] ? debug_smp_processor_id+0x18/0x20 [ 478.430460][T19907] ? switch_fpu_return+0x83/0x190 [ 478.435670][T19907] __x64_sys_mount+0x63/0x70 [ 478.440293][T19907] do_syscall_64+0x44/0xa0 [ 478.444719][T19907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.450621][T19907] RIP: 0033:0x7f41f344b01a [ 478.455039][T19907] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 478.474843][T19907] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 478.483264][T19907] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a 12:39:39 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000e0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) clone3(&(0x7f00000002c0)={0x40000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0xf}, &(0x7f0000000200)=""/160, 0xa0, &(0x7f0000000140)=""/30, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) sendfile(r0, r1, 0x0, 0x1) r2 = syz_open_pts(0xffffffffffffffff, 0x28000) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="6d7b4534119d1bf9767f1566d1ba132be96144d6acd4d9ee3ac429ca64ec0e8c430a6563b7011c3fd676391d630dfe7c6ae0d15ec0cdd419ff7cd1750e0a", 0x3e}], 0x1, 0x9, 0x1) sendfile(r0, r2, &(0x7f0000000340)=0x4, 0x333) 12:39:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000180)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000538c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000053ac0)={0x0, ""/256, 0x0}) r5 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000053cc0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "c275bdda3a6eb2"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054cc0)={0x6000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r4}, {}, {}, {}, {}, {0x0, r7}, {0x0, r8}], 0x64, "0654eb88382837"}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r9 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r9, r0, 0x0, 0xffffff04) 12:39:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000d9000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 478.491328][T19907] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 478.499509][T19907] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 478.507572][T19907] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 478.515547][T19907] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 478.565036][T19915] loop2: detected capacity change from 0 to 4 [ 478.565694][T19913] loop1: detected capacity change from 0 to 1054 [ 478.585960][T19915] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.589565][T19909] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 57) [ 478.616702][T19915] loop2: detected capacity change from 0 to 4 [ 478.623212][T19915] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.626783][T19913] EXT4-fs (loop1): bad geometry: block count 55552 exceeds size of device (527 blocks) [ 478.646820][T19921] loop3: detected capacity change from 0 to 4 [ 478.654645][T19921] FAULT_INJECTION: forcing a failure. [ 478.654645][T19921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 478.667974][T19921] CPU: 1 PID: 19921 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 478.676538][T19921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.686600][T19921] Call Trace: [ 478.689880][T19921] dump_stack_lvl+0xd6/0x122 [ 478.694524][T19921] dump_stack+0x11/0x1b [ 478.698872][T19921] should_fail+0x23c/0x250 [ 478.703406][T19921] should_fail_usercopy+0x16/0x20 [ 478.708458][T19921] _copy_from_user+0x1c/0xd0 [ 478.713056][T19921] __se_sys_mount+0x119/0x2f0 [ 478.717820][T19921] ? __this_cpu_preempt_check+0x18/0x20 [ 478.723530][T19921] ? switch_fpu_return+0xc9/0x190 [ 478.728550][T19921] __x64_sys_mount+0x63/0x70 [ 478.733277][T19921] do_syscall_64+0x44/0xa0 [ 478.737698][T19921] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 478.743618][T19921] RIP: 0033:0x7f41f344b01a [ 478.748029][T19921] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:39:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001000f0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 478.767791][T19921] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 478.776285][T19921] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 478.784251][T19921] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 478.792222][T19921] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 478.800188][T19921] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 478.808162][T19921] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x2382) sendfile(r0, r0, 0x0, 0x3) 12:39:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000da000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 478.828485][T19924] loop2: detected capacity change from 0 to 4 [ 478.830832][T19921] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 478.835765][T19924] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:40 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) getdents64(r0, 0x0, 0x2000) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x20, 0x400, 0x0, 0x10000, 0x81, "280dbc2ea44d945089c347801fbb9cbb97ca89", 0x9d, 0x8e6}) r1 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r1, r1, 0x0, 0x3) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r2) getdents64(r2, 0x0, 0x2000) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000040)) 12:39:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 58) 12:39:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100100c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 478.879123][T19924] loop2: detected capacity change from 0 to 4 [ 478.885968][T19924] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.893878][T19929] loop1: detected capacity change from 0 to 1054 [ 478.904568][T19929] EXT4-fs (loop1): bad geometry: block count 55808 exceeds size of device (527 blocks) [ 478.942888][T19933] loop2: detected capacity change from 0 to 4 [ 478.949741][T19936] loop3: detected capacity change from 0 to 4 [ 478.949931][T19933] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 478.961271][T19936] FAULT_INJECTION: forcing a failure. [ 478.961271][T19936] name failslab, interval 1, probability 0, space 0, times 0 [ 478.976445][T19936] CPU: 1 PID: 19936 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 478.984944][T19936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.995003][T19936] Call Trace: [ 478.998276][T19936] dump_stack_lvl+0xd6/0x122 [ 479.002865][T19936] dump_stack+0x11/0x1b [ 479.007200][T19936] should_fail+0x23c/0x250 [ 479.011616][T19936] ? getname_flags+0x84/0x3f0 [ 479.016311][T19936] __should_failslab+0x81/0x90 [ 479.021066][T19936] should_failslab+0x5/0x20 [ 479.025635][T19936] kmem_cache_alloc+0x4f/0x320 [ 479.030456][T19936] getname_flags+0x84/0x3f0 [ 479.034984][T19936] ? should_fail+0xd6/0x250 [ 479.039480][T19936] user_path_at_empty+0x28/0x110 [ 479.044408][T19936] __se_sys_mount+0x217/0x2f0 [ 479.049079][T19936] ? __this_cpu_preempt_check+0x18/0x20 [ 479.054623][T19936] __x64_sys_mount+0x63/0x70 [ 479.059248][T19936] do_syscall_64+0x44/0xa0 [ 479.063659][T19936] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.069560][T19936] RIP: 0033:0x7f41f344b01a [ 479.074057][T19936] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 479.093656][T19936] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 479.102075][T19936] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 479.110039][T19936] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 479.118038][T19936] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 479.125998][T19936] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 479.134074][T19936] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 479.151471][T19933] loop2: detected capacity change from 0 to 4 [ 479.396068][T19938] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000011e4000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:40 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x4, 0x62c1) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000001200)={0x0, 0x0, 0x6000000000, 0x1}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000200)={{r2}, 0x0, 0x4, @inherit={0x68, &(0x7f0000000100)={0x1, 0x4, 0x0, 0x9, {0x6, 0xff, 0xe2c, 0x6, 0xf0}, [0x6, 0x100000000, 0x5, 0x7]}}, @devid=r3}) 12:39:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 59) 12:39:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100110c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) sendfile(r2, r1, &(0x7f0000000280)=0x3, 0x40) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 479.492005][T19941] loop3: detected capacity change from 0 to 4 [ 479.506166][T19946] loop2: detected capacity change from 0 to 4 [ 479.506450][T19945] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 479.513087][T19946] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 479.537045][T19949] loop1: detected capacity change from 0 to 1054 [ 479.543510][T19941] FAULT_INJECTION: forcing a failure. [ 479.543510][T19941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 479.556583][T19941] CPU: 0 PID: 19941 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 479.565004][T19941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.575085][T19941] Call Trace: [ 479.578376][T19941] dump_stack_lvl+0xd6/0x122 [ 479.582980][T19941] dump_stack+0x11/0x1b [ 479.587291][T19941] should_fail+0x23c/0x250 [ 479.591878][T19941] should_fail_usercopy+0x16/0x20 [ 479.596920][T19941] strncpy_from_user+0x21/0x250 [ 479.601837][T19941] getname_flags+0xb8/0x3f0 [ 479.606354][T19941] ? should_fail+0xd6/0x250 [ 479.610881][T19941] user_path_at_empty+0x28/0x110 [ 479.615836][T19941] __se_sys_mount+0x217/0x2f0 [ 479.620588][T19941] __x64_sys_mount+0x63/0x70 [ 479.625201][T19941] do_syscall_64+0x44/0xa0 [ 479.629760][T19941] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.635664][T19941] RIP: 0033:0x7f41f344b01a [ 479.640078][T19941] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 479.659820][T19941] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 479.668295][T19941] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 479.676271][T19941] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 479.684251][T19941] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendfile(r0, r0, 0x0, 0x3) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000200)={0x0, 0xe94, 0x0, [0x75e, 0xffffffff, 0x6424, 0x1, 0x2], [0xffff, 0x7ff, 0x1, 0x1, 0xfffffffffffffc00, 0x7fffffff, 0x3, 0x1ff, 0x7f, 0xb3, 0xffff, 0x3f, 0x6, 0x100, 0xffffffff, 0x9, 0x7fffffff, 0x4, 0xba, 0x8, 0x100000000, 0x5b86, 0x0, 0x5d8a, 0xbd, 0x6d, 0x3, 0x6, 0x4, 0x6, 0x4, 0xfffffffffffffffa, 0x200, 0xfffffffffffffc01, 0x60, 0x1, 0x9, 0x1, 0x7ff, 0x500f, 0x10001, 0x1, 0x87, 0x0, 0x100, 0x400, 0x5, 0x8, 0x0, 0x3, 0x8, 0x32, 0x100000001, 0x7f, 0x7, 0x3, 0x1ff, 0x6, 0x9, 0x8f2b, 0x3, 0x10, 0x0, 0x2, 0x4, 0x200000000000000, 0x3, 0x9, 0x7, 0x9b7e, 0x2, 0x8, 0x800, 0x6, 0x7, 0x3c, 0x7f, 0x7, 0x4, 0x5, 0x0, 0xff, 0xfffffffffffffff7, 0x6, 0xe91e, 0x6, 0x1, 0x3dc, 0xa0, 0x1f, 0x8, 0x5, 0xfffffffffffffff8, 0x800, 0x6, 0x6, 0xffffffff80000001, 0x10001, 0x3, 0x7ff, 0x7fffffff, 0x0, 0x80000000, 0x10001, 0xaef, 0x1, 0x9, 0x83a9, 0x8, 0x7, 0xfffffffffffffff9, 0x800, 0x101, 0x7ff, 0x8ad, 0xe4b, 0x101, 0x3, 0x8000, 0x0, 0x1f]}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000640)={0xc, 0x7, {0x8000, @struct={0x9, 0x1}, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x5, 0x34, @struct={0x1000, 0xf4}, 0x80000001, 0x9, [0x80000001, 0x3ff, 0x1, 0x80, 0xffff, 0x1]}, {0x2, @usage=0x401, r1, 0x8, 0x1, 0xfffffffffffffe00, 0xb1ed, 0xfff, 0x418, @struct={0xffffffff, 0x9}, 0x97, 0x7, [0x6, 0xf1, 0x6, 0x1, 0x174, 0x5]}, {0x80, @struct={0x4, 0x9}, 0x0, 0x3, 0x5, 0x100000000, 0x80, 0x1, 0x40a, @struct={0x0, 0xa6bf}, 0x7, 0x4, [0x100000001, 0x7, 0x0, 0x3ba, 0x8001, 0x1000]}, {0x6, 0x9, 0x8001}}) 12:39:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x2, 0x583100) sendfile(r0, r0, 0x0, 0x3) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 479.692284][T19941] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 479.700272][T19941] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 479.708990][T19949] EXT4-fs (loop1): bad geometry: block count 58385 exceeds size of device (527 blocks) [ 479.713057][T19946] loop2: detected capacity change from 0 to 4 12:39:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0x9) sendfile(r0, r0, 0x0, 0x3) 12:39:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000011e6000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 60) [ 479.771670][T19946] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 479.804083][T19961] loop1: detected capacity change from 0 to 1054 12:39:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100120c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 479.821903][T19961] EXT4-fs (loop1): bad geometry: block count 58897 exceeds size of device (527 blocks) [ 479.840903][T19966] loop3: detected capacity change from 0 to 4 [ 479.858697][T19966] FAULT_INJECTION: forcing a failure. [ 479.858697][T19966] name failslab, interval 1, probability 0, space 0, times 0 12:39:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x303383) r1 = dup2(r0, r0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000040)) sendfile(r0, r0, 0x0, 0x3) [ 479.871639][T19966] CPU: 1 PID: 19966 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 479.880100][T19966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.890150][T19966] Call Trace: [ 479.893430][T19966] dump_stack_lvl+0xd6/0x122 [ 479.898034][T19966] dump_stack+0x11/0x1b [ 479.902223][T19966] should_fail+0x23c/0x250 [ 479.906677][T19966] ? alloc_fs_context+0x46/0x500 [ 479.911614][T19966] __should_failslab+0x81/0x90 [ 479.916403][T19966] should_failslab+0x5/0x20 [ 479.920980][T19966] kmem_cache_alloc_trace+0x52/0x350 [ 479.926269][T19966] alloc_fs_context+0x46/0x500 [ 479.931032][T19966] ? strncmp+0x34/0x70 [ 479.935101][T19966] fs_context_for_mount+0x1d/0x20 [ 479.940122][T19966] path_mount+0xdf0/0x1c40 [ 479.944539][T19966] __se_sys_mount+0x24b/0x2f0 [ 479.949247][T19966] ? __this_cpu_preempt_check+0x18/0x20 [ 479.954807][T19966] __x64_sys_mount+0x63/0x70 [ 479.959460][T19966] do_syscall_64+0x44/0xa0 [ 479.963917][T19966] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 479.969869][T19966] RIP: 0033:0x7f41f344b01a [ 479.974282][T19966] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 479.993943][T19966] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.002362][T19966] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 480.010461][T19966] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 12:39:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000011e7000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 480.018438][T19966] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 480.026418][T19966] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 480.034391][T19966] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendfile(r0, r0, 0x0, 0x3) [ 480.065958][T19968] loop2: detected capacity change from 0 to 4 [ 480.073080][T19970] loop1: detected capacity change from 0 to 1054 [ 480.079891][T19968] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.101570][T19970] EXT4-fs (loop1): bad geometry: block count 59153 exceeds size of device (527 blocks) 12:39:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000fffffffe000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 480.117057][T19968] loop2: detected capacity change from 0 to 4 [ 480.124679][T19968] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.159015][T19978] loop1: detected capacity change from 0 to 1054 [ 480.166126][T19978] EXT4-fs (loop1): bad geometry: block count 65279 exceeds size of device (527 blocks) [ 480.340200][T19979] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100140c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:42 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'nr0\x00'}) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x110000075f, 0x3f3341) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x401, r0, &(0x7f00000000c0)="c900a516879837459e95322078fb8cadab2b50a6ced7baa711d76954060837cac10ac753fa640a3a0d0e6c1f9c46ee3c8957bc855c03df576e02743164477405e7e323f944f09652acf0c2fd870d7506ff2982afcaf7dec3cec0948328d153d24cc93255c08fe94ddadbe018f3fd", 0x6e, 0x100000000}]) sendfile(r0, r0, 0x0, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001340), 0x10000, 0x0) io_submit(r1, 0x3, &(0x7f0000001500)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x6, 0xdf40, r0, &(0x7f0000000200)="7277b217bf51dade746188e51dcff60a98c78f721f607fbcd55c1b89b640c6bf4ada3c97fb4db47501ab1a7826365ac1bc02995df88b37093d6e228307a2889dd01193559f3983d28ec82257d422725016ecc2425afc961a8cd80af32213de8868fe3c08560b6615fea258ac510ca323a436b552ee8f649af22d83ac6395b016de853a608805dc82dcdd42924d8fbed28284c76d61dc4d948191d905c924551ac852adfd107f241c43d31c273eb60132d7a2df940e3bb57fe138d6896f63e0af41053be6145c0d795a471ab85f5bcfcccfee44e2a0afca2729cf1a8d4e91263d57e406745b85fe54d551", 0xea, 0x800, 0x0, 0x1}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x3, 0x6f, r2, &(0x7f0000000340)="4dae35a13afedb576ad2d9ca63a7749441fcc23493889d4bd86597378755a6b57da56ff3fbb16ed3e03eee3efa017fc29ac4b46b5f9a49fc8acfe644636c63c8e806eca12993e80c9978994b48e46da16239fd43a01dac259d74f1d260f3e1e0d915ad9b35f85d75871cfe9a7abecfd85e3e22f7826d14b7b902675be3bc36b1149ed2ac4535181078bd48784691b538524bedcc001c7e94dd306d6f94b3692570fa198a06071d745f8581a4e40ab6a0a1a385aa95d3ecc57fce08aae75e6d5ced318c8ce234c8216b1f830c6664069790f90c359b14d56136dd86acead7157ae03cc3fab889deab4453b725fbebe3cf3f07725433e26f24657fc940c0da71aeee928639716ba3081cbce56ed640821aa116e18a62c9e8293146b2f1bd61427472a2770e08241337a9fc90849d4478b133cbd4af52cabfc055d690911bce4b226b8cb721e6d6fdc35ed41199024edfda7b00c53e7b08084a947f956842537d3430d4595dc25df30840262a3198203dbc1d7110fb50abf9088fff4235f43b7ad272bb36ae2e8caa83da3d0909e4818d4844693d0c2f17c4e133d0926bea97a7a2fa95a6e9621aa8569fd052804e1c1b6862795024f01c06bfcc0bd68e4808aeed56f391140f30c619482c319e5afd3cf2974db992686511a564fd6c13cb39e68a5efd5be8823095663b3ca7ab0104a06827de4c421fd4ccb1c86c916e262dc385afd416ae09b3c3a8faefee2d20701c77ead4a6e346ebc5eb22d41b413da30f715f83b7905589f2b743be944418fbb8277be7fefd0d5cf9647b9d9334f3679c9c018dbbc68924844ec7980f5e8dc4bdb526f5332ce72b24f914488280c84aa32c89b0a1ff3d575f731c6d49f810b6e7be30f209ece65fa8cc6dd85eb1863ed5bb628d650cacbe7ed9477d3e3c3674fd15962627954877883553c0826d76474a764e310b679f17235d59cc1bda50573809dbf8d846070f3f45cb91a2b3732ffcf57d1014861d4d918ddbcaa5504c18e00c2c79ea138223e8801caf88145b90ae509169f9fec781768963ac76b3a4807239d64bca5b0401c47397a8ac3b5e6b2a1162406953493c482b3649107578ddce6428347eab82f67843760399d68b8ecc09a8766189170f0c310aa6e182a5433aa06a6bb853a42aeb2995c96a7e1c2e7599643ee1b686ec083db733c38e20d737dca373e2efa8f949e9ce90d9cf38ff72ab48ac2fa4978b3440b5fab759c14b6545436a3a04c9258090b9cf5f075a532b5961a8011110f99751c8fd5dfcf6fff00887363db7d76b7fd4b0d70f590a829669a14e480e6c463ae70a645a85bb5522c576146f866fa861b8ddef355e2dcd8c69de34569ba3fb17806cf5c23bd3b1ec1a668e0b64311656208d1e009a8bc7ea53c86328199f2da6c2be26b96c96e8d8f3bace7529168c63a959f518604a4b236cce7c352d76ad586343e929fa577ad38c8ab365596f50fc15370dd8597e27cb2458ba488ddc4910c06fa7a1f3d4c88064576208caef28b4702f77b9acbb8cce989ec6533b833a9026663c756c83bc979d78b180008b539dd0aa49a1eabbe35de6b0ba22eba26ca244d8bdbdfa3f55765d80ef8f75905d765615d13bf4fdd0bcc5c8fbfb908ebcddc34f4d137803127ba6405fa50f6e0a5d12ef5c325164929bf19642fdc6dc5bba466cbf359c1ec737bd5fd47a2f39903f4f308ce422d05f82ab751813acddcf1b7e2627e84614158cbd5be7213dfa4cc78558caa7497aa96c4fa7cb9bb823aff09d9ecb5b370e89dc8179eff870902863f98341942fb4e05e2625c53615403aeabc7575cf68b88355ff65a7c33d3cb6f323f4e69d9d2a546f519d9f3982a700ddd8e0dc5d24715f33f79d43cdcbb1c4c92c70f8bcfc83831911cd5061d04c65b2171da52b5d2d2dc6a4e46822583d48ad27ce1277d3d7adcdf9dee104ca3dd47fd419babf1ac88948861a2f66a4e11bb01847729349880c5e1fd4e178a7849c8f81fcf653e13837712730814e9fba79e6728dbacb2fa779acdfe422162bfb76481545b3ea53289b6e3f657831a6c0254588d6458f6e9c917380698e7912ba6ed1f549e7e6a56e36a4c516b01cddd25d5fd44d852f42993f6eee655df93236929e9083b6c79d486ab1f385e4837324a283a075ae2565b9a5f37dcfc1fd65b7cb0f6d5eddc75085d6a5d53a944ca5bda2f2c7ababd3fd3644ec3434bc42663853375f19b721714e176ed6e0a9046a99fe216af6e077e9eb5bb2fc5ac55c6df858878853296453e55c77d4e04279775daf0e0b0c350675a9509a94211a96990696acf111f80dce4eab3a58ac443b741a39e9b6e1f2133d4193aea14063bd42edf2dc20c0e96568120870b581dcac67d0390dbff9b6a20e6e06d010ed84bdd2da4b9f4cae02264eec3e1724916423a17e9946f25fe79da63786811ff98764d31262691e459440cfc312eef36ff804097031c5e6c685dbe3762bfb6dc01140ab99b021af2161fe325515e5af4e0a6c673c94a48eecb6072b30e45c473683ab5fcedee8f060aa4a432df16253524af037f5f71a3ffa430097af07821aed4e412a74d82118ee93f1e712c302481b55f93cb3ffd9902ac0019c1abb6615a17c612719899bc03551178672c8dc2beb5336ed965c520bc9e758193344839c9a1658bab1476b8481dc9ebef9fe4fff3be457d24ff9baa1d8af953823befdd7f8e6c6e274f811ca933f16859d758b4ce50e2e6e07b71e4c187ce6e9ec2c1a3e06e2adf8cd82512a652413cf3b34abb47810ddfa1a88726e5f26d6fefcb938f606962f6076fd6d60ad1e0265307f0c9b4e5f2b45efc27bb190d9dec8dc2232c2d5e8a089a600b3c2dc1a67131be8522cee0eb1fa258022ae69ed90a6ac01f5c9d1643667de84aaea41d6092fc69f23c2c067296c841467bf36f019e7d4a171cce2cc5caba5c6ec6327e0e86fce54cc98cb0a2c1488d4ad6e9e1ed68b2781b167a6158830cf518f5c46f15d4a07cbafecfa24ef85ca9d2a106e5ab7d12c6646acede9b8edb8a6c9b0e99137ddf0d919be31e6bc155da30e173054dad503e63283bc7d4a8f268658d358fa20e34f9194dd80fc505fe1966308aa0a2802e04f71e512417c27c78f3f72757dd0cc456400fa81805a0aa7db8e5d606b9abc20d5c9cccf0fa9e390c67a84666df525a93612e43a410a4a9a5fb44e52c15c43f9de204cfe0ba11938cbe33b9bf642f0d14dd7b39f814f70c2b3bfac787f28d51aebf840b1abe08b45c4ccd1b1903c7ce4c426862ef506b500247709d2df7c40b548be1d4a243b3cceee32ad5476bfdcfac395e0c5e6d6cddd6aacb3e802c45f9acac18daa0bb5c6c4a983ced09c512ba00c31ff72127dc4c474df7c124d1c8d2f6313e56fa584be64b38d8bbbb99ee5c28fb998f6de21aee4d2e6c3f3e928e6e472f4070d721130ee7ebcfdab213ced98052f4ed9b5bafd8fff1782935a963a9fb5a73559e2246ae97c57995ac2919bcabd7b5c39482f1283199a0959ce960310c9009b11d93a0b5113600f3aff2993bb70d505b026e1f8dc4a675233fca518e3a70e0acb01247f42ab29478e6946f9b8842a055b2d7aa9d05617fbb881df2f1ceb8bde964d7a1df213de24d08b4f640ac5a071508ea6fb14b8332bf7888e38361cba2c1c5e557cb36e852427d444acbfc2e30c7c76692aff4aa0c387323e9bff2c856bc8656f7ccd902d89cd4f16df47ecf6b09c5b06db46e758edbc6042fd2c96d60363a87a5b496e5e20521b7de32d5226d34d981109d2cc72c37bd5a07286345b9b655389c674d1360da4dc58f73bb10bbf11398799059bed5a1b81ad636f496cd56461e5894f1f5c5d74f1a59d064ea1a15a4967ee08148dc5f41293bd0110696846f236e7b94dca839a90ab86dc2a873182cdef98af602b906414d42d7aeef39182fbb6087f351dc04d54dff4a977848f061b600515a5b4d452b66b26482a6a3c47d75441380fc88c78884d25931de60d5ef05822f980713f8f6a486f3ad4926f80f97136c18e3c9a99ecad386f4801f56e27a8efdc67bdd7e583183e8be00ee2181e8fa2f6e2863bb9ca230fe8d7e025ec18d532308d3ca509f62531cb3f2da75c7de74ba012b8097df8dd27c2531d05f8695d7b80c17831ffcf5c322beb7070f789d5e0f7057ac7393bb19a351c1521823b20663121851e10693cf3c1fc3eb5cac7004b42896abdf76cad4e70a048dee8e126aafd2e9b6eaa917fd4011a341146de07cca2959f497f92f7564cbba9604667a01bba9f11be6dc37790f9d03194a493fedd176b5ed7b2a1026c32a93ccd473df9460796b8b11be38f7faa50adde712a864a826c3e0e97e35136e3c387a48577ead85ad218225a0f8c5eee93b8f8e699fca9365990ac3fb9fd03df0fd9429662f24e8129e170963e0490df7e53ccf692a6ea9b06ae4b402c7dd1c2b5e6690f92c75ff80ddd3fbd99f940fb74b576726736c8450fb10c31585a30f76bb07e360278fb04d33eb0920c3014437c7f39634de610e905e59f06447c1cf50ff8ece661b3d42a98c801fa78d6b0c6bb87de86f2b8eef65eab526e264984dfb8adda10d0a246329b76261e3a6ad9e447a4ab87623d70195c4fee8a2774ac2727ee81aa58e8da9814591b1e1f057e8ba8560eb3d02e15ecf0adb69bc6bab242048f43ce2b2c037805c679585f0571b59f7fa12f2dc6486563f42ca3c08195cd4cf20827d9198e5e0f3232202ba052474d2ccd96bb5fa3252556b3b20695698876c53ac5d631ab0a61eaf5c113e778f1d3a15b3e4c6a72849fe92ec47633ae07640d59e85797bc9050da0001ac53c5fb2df22e4164d3006ec19a56c80bbe8c5de2811367ca892f49b74e417679c8940489da3178a8393a8a416ed79d3f45a05d4571ed600b3dc278a6ddcb231e8307fc04f2100b7503a9b6b1d382cc1d88bf88a7e074f75c24e87b3304b448945814c30d5f0957f81c4259eba4f41efc612c2d014c9c15e4debd31918e4ebee65aa0989798e60a7f38e0df12dc9356d0ba3a9aa0c9d94ad4366036710fbd1fd7b97caf80ba5a0ace776f8ce2c2bde606ad7512fd7e678255d7c47701d29ebd239582b0025e38e62fa5bb24fe59b1c51881ed0df0ad723437d6194236e3c3762a978f3aba0a6acdc4b3481768389c96c38019212ea1e899389371093c50041253f6ddffb5437f846fa11a29cf5e72e452e2368982d177a62b3c2ed387e4f5655469ad2015da68ad6374c089da638dfb747da8a4ddcc70936bf6bb636bb10516a2cf241eb011678007f6d8c826f11ef8a1ef45bde36e02a2d2d5fcb794f0901bc55d83343d1d53db2d256af72d3f350da3c44f7f748b960cd0f32016989b37014f10a5a9ac3bb0eafbf5c7c3173194933b024fb090847f47be536378a814d60b2d8181f6227e50cb02c22dbee2c47de4695b99345c5bcb2aad15a90a0309e1f850e092bdb6a905cac0c5f021c6f05cc632cfbcaa9e840890cf093dd07e1a77d1ca970c9564ff6142624cc30af0ed7e8a31dcd993c9fdd995fac72b4ddde291fc9b3435b9a0cfd0156080f9d5fd69f4c593e9c32af1bd6a599efe002a5b027f9d84a52984b54f673205ce6253293b97fbfbbdf223e650a03ede0f7f2173cf24a1e2ec6f7c46390bbdfddd7b5a4c9a767c4950d7892c0afabf17c38728a327f3ca4b67eb73af12af6675d343be51eab89bda52ba65b551851e655c6e21466eb6afd638c8d95aa5033e460a7d618570397646f06deb1a9a9cbb27be6d6da1e355b21643ff53a2a08f", 0x1000, 0x0, 0x0, 0x3, r3}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x3, 0x7311, r0, &(0x7f00000013c0)="a87ef782af15ae4320d3675443858f87c9afe950ac1171478c0532ad5f3e4a3579c3833519ad0c5643ad8b5a4e2408a80c69540e109bc897a911463337085226ed24f7faa89c27175a169ac6882aa49afe5922ff830dc7981e72b31a3128849f091f119936edb1c1938af7ad2e501d64f12727e75a0f66e721fc0e9d1d2ed243506fe7b7ab51acc97227508cccab8e696032ec5687150b45ad82f06d4427b8daa3a3a6cba246500d058873d0401efee99325e54985d46a2a2c7edda6a5cb396e35016de9138a86db466b0e1efd821aa3b20086945fbfdbf6a25c00e3c1a44262ca481f9e05dc46a55117", 0xea, 0x1ff, 0x0, 0x1}]) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) 12:39:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 61) 12:39:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000003ff000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:42 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x82200, 0x84) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) r3 = accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000280)=0x1c, 0x80000) write(r3, &(0x7f0000000780)="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", 0x3b9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) [ 480.606010][T19983] loop2: detected capacity change from 0 to 4 [ 480.610527][T19988] loop1: detected capacity change from 0 to 1054 [ 480.615506][T19990] loop3: detected capacity change from 0 to 4 [ 480.624701][T19983] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.633422][T19988] EXT4-fs (loop1): bad geometry: block count 65283 exceeds size of device (527 blocks) [ 480.646846][T19983] loop2: detected capacity change from 0 to 4 12:39:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100220c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 480.653629][T19983] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.666298][T19990] FAULT_INJECTION: forcing a failure. [ 480.666298][T19990] name failslab, interval 1, probability 0, space 0, times 0 [ 480.679044][T19990] CPU: 1 PID: 19990 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 480.687506][T19990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.697604][T19990] Call Trace: [ 480.700892][T19990] dump_stack_lvl+0xd6/0x122 [ 480.705534][T19990] dump_stack+0x11/0x1b [ 480.709781][T19990] should_fail+0x23c/0x250 [ 480.714328][T19990] ? legacy_init_fs_context+0x2d/0x70 [ 480.719702][T19990] __should_failslab+0x81/0x90 [ 480.724514][T19990] should_failslab+0x5/0x20 [ 480.729088][T19990] kmem_cache_alloc_trace+0x52/0x350 [ 480.734391][T19990] ? kmem_cache_alloc_trace+0x24b/0x350 [ 480.740019][T19990] legacy_init_fs_context+0x2d/0x70 [ 480.745220][T19990] alloc_fs_context+0x419/0x500 [ 480.750066][T19990] fs_context_for_mount+0x1d/0x20 [ 480.755158][T19990] path_mount+0xdf0/0x1c40 [ 480.759574][T19990] __se_sys_mount+0x24b/0x2f0 [ 480.764291][T19990] __x64_sys_mount+0x63/0x70 [ 480.768896][T19990] do_syscall_64+0x44/0xa0 [ 480.773327][T19990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 480.779242][T19990] RIP: 0033:0x7f41f344b01a [ 480.783662][T19990] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 480.799529][T19987] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 480.803285][T19990] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 480.803310][T19990] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 480.803323][T19990] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 480.840777][T19990] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 480.848744][T19990] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:39:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20007fffffff000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 480.856792][T19990] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 480.883809][T19997] loop1: detected capacity change from 0 to 1054 [ 480.896138][T19997] EXT4-fs (loop1): bad geometry: block count 65535 exceeds size of device (527 blocks) 12:39:42 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) r4 = timerfd_create(0x8, 0x181800) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r5) getdents64(r5, 0x0, 0x2000) io_submit(0x0, 0x5, &(0x7f0000000980)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x6, 0xffffffffffffffff, &(0x7f0000000240)="b9d36bbf6fa435a055600f3b4a99c8284bfa36bd6e06030981c6d1f8f1c8a773c810d7d824bd152a8924f0547e50e748fcc71e58621c360b691631bf5058fa6fde76df78ccc15baa5f67e2f55fd17926545d35052ec863c8e7e4ca5c2e259032238150c24a7a5b7d2b6ab14a4c2f86543a6d31544218fc24bac9f9cde323590b046944749a7ede1892224d83194e0997f1b7ad5d910335b549ec5f90c694660f8a22f6a6182adccc59a37019ac9ee96ab84f7f738332bb32671fe6f017e3941215956f73746a20", 0xc7, 0xfffffffffffffff9, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x4, r3, &(0x7f0000000440)="8a5245acdb29deaae865d5cda5129f3bf5c4353e5ddc9363babece7d4da7c858f9c857b85eb1483b3625de349b9047f36b0e7774925d770edee85f6dd9f43cd42a237de47e61f0f516e0719a5e10536bd0040479cf36bb1168", 0x59, 0x6, 0x0, 0x3, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7720, r1, &(0x7f00000004c0), 0x0, 0x100000000, 0x0, 0x3, r2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x6, r2, &(0x7f0000000540)="f19eb646ee7de90f66abad703ec8344de2a988a1ccc8a082d25af5831d8cc8367001be5891194b4c08d52ff4c450988d67fa5ccc763bbbcf1d572ca009c15f33164d3b9d802f3d9168a4d3962ba5d62157d3e7c3256bb8b45122c39792abbc95f831592eebc8aed97845847662dfd3fb34e2d0bc2ffc4d410264c990ed2c85e26838f49909e852d334d8eb7e5707ce4820f490fd46c64a007190cce7529e8c569180fc53ae7c165a6a689096a10f33", 0xaf, 0xffff}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0xf, 0x3, r4, &(0x7f0000000840)="5f79b54487fea257088168a75cc435813bb902ba5141f2c39968a3beb17c01227dd9d43242677f312af0542d008e26c349075a47cfc1fa996cb486ec76d2e75a33710444cf08f4ebfdef6a3f74bd332a331cdd0ef961a88b1314ec0e38b2bd38be09ba5b2f358c1bb533652f4b1566d70f1c245c3e123334e23049271557b74100d4e05f41f2672f6c5858175f5ef871e479f84f80306e0a58f2a530802ae9cf43267838e7332be5bd376eb7c7f897c4b9099bfea54b4d1a4f8b732629503bb54d276c326930bcf217e4bb7437fdcc4b54708c80ca408bbce326255a4151512844d84c98a7ae4c2a6a48445aec169f7a39962d59dce939", 0xf7, 0x3, 0x0, 0x3, r5}]) 12:39:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000340)={0x20, 0x6}) syz_open_dev$loop(&(0x7f0000000380), 0x100000000, 0x2) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000000)="3dbbdf6f420eb443a8ea457083f7d9c2cd4edb2c279164831d9ec90dfb542bb0094cf8a78165f9979175b1dce2e7b5194fb6bdb6735817f29319783ccffddd3dd312ecde45beeb04625ae717c1394a90ba73a43c2aa119fbdf912f2b08171a926ae7ebcd290186b477e29e6c1ec1aa08e6182c1d7505c9ec0b021c57b6af6cee4432c34a44e4209f1640b33651414937052c67615c485807b290ebd606a6bdac5abea905f6cf063a424ccbf7ac5920e05cddf812475918a9764d", 0xba}, {&(0x7f00000000c0)="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", 0xfb}, {&(0x7f0000000200)="c3a4dba93e444e0420faa2687e91974926381952b2f4daa53367070a2f5379f77caac1e6b661a264538fb13fc79837a84efb13d7ae4bae5bdcd9a9b8dacb7caa6bdcbdf596b4ddfee58a02fe4481d3f9c6460b2373a49ebafa1edc16fe45a3aa767ae8c46d0e286500e13da3cc00991b2e2886cbdacb8161d684474f03eac8c9ad197dfd5d452f551aa2a83da0b87f59f065b5a1c0ec94fead337d0949b7beedbc3e9e938d5806ebd3f115387b848df4b14645c78b27f4b0491ff15ad0290b7992b504175fb0c08b2cd4fcda4009bc9772117c8735696d", 0xd7}], 0x3, 0x2c93, 0x6) sendfile(r0, r0, 0x0, 0x3) r1 = memfd_secret(0x4c7f21ae561c4405) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) sendfile(r1, r2, &(0x7f0000000400)=0xfffffffffffffff8, 0x6) 12:39:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 62) [ 480.917959][T20000] loop2: detected capacity change from 0 to 4 [ 480.924912][T20000] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.956873][T20000] loop2: detected capacity change from 0 to 4 12:39:42 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0x9) sendfile(r0, r0, 0x0, 0x3) [ 480.963712][T20000] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 480.964437][T20007] loop3: detected capacity change from 0 to 4 [ 480.989588][T20006] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 481.004200][T20007] FAULT_INJECTION: forcing a failure. [ 481.004200][T20007] name failslab, interval 1, probability 0, space 0, times 0 [ 481.016862][T20007] CPU: 1 PID: 20007 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 481.025322][T20007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.035416][T20007] Call Trace: [ 481.038721][T20007] dump_stack_lvl+0xd6/0x122 [ 481.043421][T20007] dump_stack+0x11/0x1b [ 481.047633][T20007] should_fail+0x23c/0x250 [ 481.052173][T20007] ? legacy_init_fs_context+0x2d/0x70 [ 481.057567][T20007] __should_failslab+0x81/0x90 [ 481.062375][T20007] should_failslab+0x5/0x20 [ 481.066886][T20007] kmem_cache_alloc_trace+0x52/0x350 [ 481.072218][T20007] ? kmem_cache_alloc_trace+0x24b/0x350 [ 481.077800][T20007] legacy_init_fs_context+0x2d/0x70 [ 481.083004][T20007] alloc_fs_context+0x419/0x500 [ 481.087852][T20007] fs_context_for_mount+0x1d/0x20 [ 481.092872][T20007] path_mount+0xdf0/0x1c40 [ 481.097292][T20007] __se_sys_mount+0x24b/0x2f0 [ 481.102038][T20007] ? __this_cpu_preempt_check+0x18/0x20 [ 481.107603][T20007] __x64_sys_mount+0x63/0x70 [ 481.112228][T20007] do_syscall_64+0x44/0xa0 [ 481.116771][T20007] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.122677][T20007] RIP: 0033:0x7f41f344b01a [ 481.127175][T20007] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 481.146789][T20007] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.155252][T20007] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 481.163239][T20007] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 481.171495][T20007] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 481.179561][T20007] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 481.187548][T20007] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100250c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:43 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000020000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 63) [ 481.737323][T20018] loop3: detected capacity change from 0 to 4 [ 481.737536][T20015] loop2: detected capacity change from 0 to 4 [ 481.744070][T20018] FAULT_INJECTION: forcing a failure. [ 481.744070][T20018] name failslab, interval 1, probability 0, space 0, times 0 [ 481.750770][T20015] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 481.762200][T20018] CPU: 1 PID: 20018 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 481.770701][T20019] loop1: detected capacity change from 0 to 1054 [ 481.778385][T20018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.778404][T20018] Call Trace: [ 481.778412][T20018] dump_stack_lvl+0xd6/0x122 [ 481.793165][T20019] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) [ 481.794782][T20018] dump_stack+0x11/0x1b [ 481.816214][T20018] should_fail+0x23c/0x250 [ 481.820652][T20018] ? vfs_parse_fs_string+0x6d/0xd0 [ 481.825765][T20018] __should_failslab+0x81/0x90 [ 481.830532][T20018] should_failslab+0x5/0x20 [ 481.835028][T20018] __kmalloc_track_caller+0x6d/0x370 [ 481.840448][T20018] kmemdup_nul+0x27/0x70 [ 481.844684][T20018] vfs_parse_fs_string+0x6d/0xd0 [ 481.849620][T20018] path_mount+0xf94/0x1c40 [ 481.854022][T20018] __se_sys_mount+0x24b/0x2f0 [ 481.858688][T20018] __x64_sys_mount+0x63/0x70 [ 481.863264][T20018] do_syscall_64+0x44/0xa0 [ 481.867826][T20018] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.873761][T20018] RIP: 0033:0x7f41f344b01a [ 481.878219][T20018] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 481.897838][T20018] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 481.906293][T20018] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 481.914252][T20018] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 481.922215][T20018] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 481.930205][T20018] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 481.938208][T20018] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 481.970126][T20015] loop2: detected capacity change from 0 to 4 12:39:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100280c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:43 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x3}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 64) [ 481.977740][T20013] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 482.025703][T20027] loop1: detected capacity change from 0 to 1054 [ 482.033022][T20027] EXT4-fs (loop1): inodes count not valid: 33554464 vs 32 [ 482.035171][T20029] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 482.041281][T20031] loop3: detected capacity change from 0 to 4 [ 482.062795][T20031] FAULT_INJECTION: forcing a failure. [ 482.062795][T20031] name failslab, interval 1, probability 0, space 0, times 0 [ 482.075514][T20031] CPU: 1 PID: 20031 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 482.083994][T20031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.094035][T20031] Call Trace: [ 482.097383][T20031] dump_stack_lvl+0xd6/0x122 [ 482.102033][T20031] dump_stack+0x11/0x1b [ 482.106256][T20031] should_fail+0x23c/0x250 [ 482.110661][T20031] ? alloc_super+0x3a/0x520 [ 482.115191][T20031] __should_failslab+0x81/0x90 [ 482.120097][T20031] should_failslab+0x5/0x20 [ 482.124609][T20031] kmem_cache_alloc_trace+0x52/0x350 [ 482.129880][T20031] ? preempt_count_add+0x4e/0x90 [ 482.134845][T20031] ? disk_unblock_events+0x35/0x40 [ 482.139967][T20031] ? mount_bdev+0x290/0x290 [ 482.144504][T20031] alloc_super+0x3a/0x520 [ 482.148915][T20031] ? mount_bdev+0x290/0x290 [ 482.153402][T20031] sget+0x189/0x370 [ 482.157342][T20031] ? test_bdev_super+0x30/0x30 [ 482.162111][T20031] mount_bdev+0xd3/0x290 [ 482.166445][T20031] ? ext4_mount+0x40/0x40 [ 482.170802][T20031] ? ext4_errno_to_code+0x110/0x110 [ 482.176020][T20031] ext4_mount+0x2d/0x40 [ 482.180164][T20031] legacy_get_tree+0x70/0xc0 [ 482.184811][T20031] vfs_get_tree+0x4a/0x1a0 [ 482.189230][T20031] path_mount+0x11cf/0x1c40 [ 482.193720][T20031] __se_sys_mount+0x24b/0x2f0 [ 482.198387][T20031] __x64_sys_mount+0x63/0x70 [ 482.202994][T20031] do_syscall_64+0x44/0xa0 [ 482.207497][T20031] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.213488][T20031] RIP: 0033:0x7f41f344b01a [ 482.217892][T20031] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.237479][T20031] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 482.245874][T20031] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 482.253832][T20031] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 482.261788][T20031] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:43 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000030002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 482.269949][T20031] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 482.277904][T20031] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 482.290107][T20036] loop2: detected capacity change from 0 to 4 [ 482.297471][T20036] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001002e0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 65) [ 482.322485][T20038] loop1: detected capacity change from 0 to 1054 [ 482.329455][T20038] EXT4-fs (loop1): inodes count not valid: 50331680 vs 32 [ 482.376797][T20041] loop2: detected capacity change from 0 to 4 [ 482.383714][T20041] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 482.394752][T20043] loop3: detected capacity change from 0 to 4 [ 482.402032][T20043] FAULT_INJECTION: forcing a failure. [ 482.402032][T20043] name failslab, interval 1, probability 0, space 0, times 0 [ 482.414811][T20043] CPU: 1 PID: 20043 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 482.423301][T20043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.425682][T20041] loop2: detected capacity change from 0 to 4 [ 482.433382][T20043] Call Trace: [ 482.433392][T20043] dump_stack_lvl+0xd6/0x122 [ 482.440001][T20041] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 482.442778][T20043] dump_stack+0x11/0x1b [ 482.442808][T20043] should_fail+0x23c/0x250 [ 482.463664][T20043] ? kzalloc+0x1d/0x30 [ 482.467741][T20043] __should_failslab+0x81/0x90 [ 482.472605][T20043] should_failslab+0x5/0x20 [ 482.477099][T20043] __kmalloc+0x6f/0x370 [ 482.481307][T20043] kzalloc+0x1d/0x30 [ 482.485205][T20043] security_sb_alloc+0x3c/0x180 [ 482.490103][T20043] alloc_super+0x10b/0x520 [ 482.494543][T20043] ? mount_bdev+0x290/0x290 [ 482.499028][T20043] sget+0x189/0x370 [ 482.502861][T20043] ? test_bdev_super+0x30/0x30 [ 482.507681][T20043] mount_bdev+0xd3/0x290 [ 482.512089][T20043] ? ext4_mount+0x40/0x40 [ 482.516472][T20043] ? ext4_errno_to_code+0x110/0x110 [ 482.521730][T20043] ext4_mount+0x2d/0x40 [ 482.525959][T20043] legacy_get_tree+0x70/0xc0 [ 482.530530][T20043] vfs_get_tree+0x4a/0x1a0 [ 482.534951][T20043] path_mount+0x11cf/0x1c40 [ 482.539440][T20043] __se_sys_mount+0x24b/0x2f0 [ 482.544105][T20043] __x64_sys_mount+0x63/0x70 [ 482.548700][T20043] do_syscall_64+0x44/0xa0 [ 482.553144][T20043] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.559058][T20043] RIP: 0033:0x7f41f344b01a [ 482.563506][T20043] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 482.583105][T20043] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 482.591538][T20043] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 482.599490][T20043] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 482.607467][T20043] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 482.615434][T20043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 482.623448][T20043] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000040002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100480c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 66) [ 482.812689][T20047] loop1: detected capacity change from 0 to 1054 [ 482.820036][T20046] loop2: detected capacity change from 0 to 4 [ 482.827324][T20046] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 482.838706][T20047] EXT4-fs (loop1): inodes count not valid: 67108896 vs 32 [ 482.853060][T20046] loop2: detected capacity change from 0 to 4 12:39:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001004a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 482.869212][T20050] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 482.877994][T20053] loop3: detected capacity change from 0 to 4 [ 482.889245][T20053] FAULT_INJECTION: forcing a failure. [ 482.889245][T20053] name failslab, interval 1, probability 0, space 0, times 0 [ 482.901891][T20053] CPU: 1 PID: 20053 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 482.910359][T20053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.920394][T20053] Call Trace: [ 482.923654][T20053] dump_stack_lvl+0xd6/0x122 [ 482.928298][T20053] dump_stack+0x11/0x1b [ 482.932462][T20053] should_fail+0x23c/0x250 [ 482.936864][T20053] ? __list_lru_init+0x70/0x680 [ 482.941759][T20053] __should_failslab+0x81/0x90 [ 482.946597][T20053] should_failslab+0x5/0x20 [ 482.951126][T20053] __kmalloc+0x6f/0x370 [ 482.955263][T20053] ? prealloc_memcg_shrinker+0x444/0x460 [ 482.960914][T20053] __list_lru_init+0x70/0x680 [ 482.965586][T20053] alloc_super+0x490/0x520 [ 482.969982][T20053] ? mount_bdev+0x290/0x290 [ 482.974533][T20053] sget+0x189/0x370 [ 482.978331][T20053] ? test_bdev_super+0x30/0x30 [ 482.983076][T20053] mount_bdev+0xd3/0x290 [ 482.987303][T20053] ? ext4_mount+0x40/0x40 [ 482.991625][T20053] ? ext4_errno_to_code+0x110/0x110 [ 482.996849][T20053] ext4_mount+0x2d/0x40 [ 483.000988][T20053] legacy_get_tree+0x70/0xc0 [ 483.005578][T20053] vfs_get_tree+0x4a/0x1a0 [ 483.009974][T20053] path_mount+0x11cf/0x1c40 [ 483.014455][T20053] __se_sys_mount+0x24b/0x2f0 [ 483.019209][T20053] __x64_sys_mount+0x63/0x70 [ 483.023776][T20053] do_syscall_64+0x44/0xa0 [ 483.028239][T20053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.034157][T20053] RIP: 0033:0x7f41f344b01a [ 483.038636][T20053] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 483.058245][T20053] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:39:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x80, 0x20) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000a00)) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = dup(r3) getdents64(r3, 0x0, 0x2000) write$P9_RFSYNC(r3, &(0x7f0000000240)={0x7, 0x33, 0x2}, 0x7) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r5 = openat$incfs(r4, &(0x7f0000000280)='.pending_reads\x00', 0x400000, 0x42) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x810, r5, 0xc36e6000) sendfile(r1, r2, 0x0, 0x7fffffff) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r1, 0x0, 0xffffff04) 12:39:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x3}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 483.066638][T20053] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 483.074594][T20053] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 483.082579][T20053] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 483.090533][T20053] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 483.098520][T20053] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000050002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 67) [ 483.165724][T20063] loop2: detected capacity change from 0 to 4 [ 483.175061][T20063] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 483.184383][T20060] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 483.198348][T20066] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 483.210244][T20068] loop3: detected capacity change from 0 to 4 [ 483.212352][T20064] loop1: detected capacity change from 0 to 1054 [ 483.224669][T20064] EXT4-fs (loop1): inodes count not valid: 83886112 vs 32 [ 483.226430][T20069] loop2: detected capacity change from 0 to 4 [ 483.234052][T20068] FAULT_INJECTION: forcing a failure. [ 483.234052][T20068] name failslab, interval 1, probability 0, space 0, times 0 [ 483.250594][T20068] CPU: 1 PID: 20068 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 483.259229][T20068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.269275][T20068] Call Trace: [ 483.272553][T20068] dump_stack_lvl+0xd6/0x122 [ 483.277154][T20068] dump_stack+0x11/0x1b [ 483.281394][T20068] should_fail+0x23c/0x250 [ 483.285818][T20068] __should_failslab+0x81/0x90 [ 483.290626][T20068] should_failslab+0x5/0x20 [ 483.295214][T20068] kmem_cache_alloc_node_trace+0x61/0x310 [ 483.296455][T20069] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 483.300986][T20068] ? should_fail+0xd6/0x250 [ 483.301016][T20068] ? __kmalloc_node+0x30/0x40 [ 483.318040][T20068] __kmalloc_node+0x30/0x40 [ 483.322544][T20068] kvmalloc_node+0x81/0x110 [ 483.327063][T20068] __list_lru_init+0x2d7/0x680 [ 483.331816][T20068] alloc_super+0x490/0x520 [ 483.336223][T20068] ? mount_bdev+0x290/0x290 [ 483.340782][T20068] sget+0x189/0x370 [ 483.344583][T20068] ? test_bdev_super+0x30/0x30 [ 483.349401][T20068] mount_bdev+0xd3/0x290 [ 483.353645][T20068] ? ext4_mount+0x40/0x40 [ 483.357974][T20068] ? ext4_errno_to_code+0x110/0x110 [ 483.363178][T20068] ext4_mount+0x2d/0x40 [ 483.367368][T20068] legacy_get_tree+0x70/0xc0 [ 483.371950][T20068] vfs_get_tree+0x4a/0x1a0 [ 483.376448][T20068] path_mount+0x11cf/0x1c40 [ 483.380947][T20068] __se_sys_mount+0x24b/0x2f0 [ 483.385654][T20068] ? __this_cpu_preempt_check+0x18/0x20 [ 483.391273][T20068] __x64_sys_mount+0x63/0x70 [ 483.395851][T20068] do_syscall_64+0x44/0xa0 [ 483.400277][T20068] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.406248][T20068] RIP: 0033:0x7f41f344b01a [ 483.410690][T20068] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 483.430292][T20068] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 483.438743][T20068] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 483.446856][T20068] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 483.454829][T20068] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000060002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 483.462828][T20068] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 483.470788][T20068] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001004c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 483.521406][T20073] loop1: detected capacity change from 0 to 1054 [ 483.540975][T20073] EXT4-fs (loop1): inodes count not valid: 100663328 vs 32 [ 483.562418][T20075] loop2: detected capacity change from 0 to 4 [ 483.569859][T20075] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 483.606516][T20075] loop2: detected capacity change from 0 to 4 12:39:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 68) 12:39:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000070002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100600c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 483.725730][T20079] loop3: detected capacity change from 0 to 4 [ 483.734808][T20078] loop2: detected capacity change from 0 to 4 [ 483.742196][T20078] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 483.750646][T20081] loop1: detected capacity change from 0 to 1054 [ 483.755987][T20079] FAULT_INJECTION: forcing a failure. [ 483.755987][T20079] name failslab, interval 1, probability 0, space 0, times 0 [ 483.760356][T20081] EXT4-fs (loop1): inodes count not valid: 117440544 vs 32 [ 483.769717][T20079] CPU: 1 PID: 20079 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 483.785320][T20079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.795394][T20079] Call Trace: [ 483.798663][T20079] dump_stack_lvl+0xd6/0x122 [ 483.803250][T20079] dump_stack+0x11/0x1b [ 483.807451][T20079] should_fail+0x23c/0x250 [ 483.811878][T20079] ? __list_lru_init+0x332/0x680 [ 483.816990][T20079] __should_failslab+0x81/0x90 [ 483.821763][T20079] should_failslab+0x5/0x20 [ 483.826342][T20079] kmem_cache_alloc_trace+0x52/0x350 [ 483.831666][T20079] ? __kmalloc_node+0x30/0x40 [ 483.836409][T20079] __list_lru_init+0x332/0x680 [ 483.841302][T20079] alloc_super+0x490/0x520 [ 483.845775][T20079] ? mount_bdev+0x290/0x290 [ 483.850303][T20079] sget+0x189/0x370 [ 483.854213][T20079] ? test_bdev_super+0x30/0x30 [ 483.859054][T20079] mount_bdev+0xd3/0x290 [ 483.863466][T20079] ? ext4_mount+0x40/0x40 [ 483.867895][T20079] ? ext4_errno_to_code+0x110/0x110 [ 483.873086][T20079] ext4_mount+0x2d/0x40 [ 483.877312][T20079] legacy_get_tree+0x70/0xc0 [ 483.881893][T20079] vfs_get_tree+0x4a/0x1a0 [ 483.886315][T20079] path_mount+0x11cf/0x1c40 [ 483.890811][T20079] __se_sys_mount+0x24b/0x2f0 [ 483.895489][T20079] ? __this_cpu_preempt_check+0x18/0x20 [ 483.901100][T20079] __x64_sys_mount+0x63/0x70 [ 483.905680][T20079] do_syscall_64+0x44/0xa0 [ 483.910084][T20079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.916008][T20079] RIP: 0033:0x7f41f344b01a [ 483.920411][T20079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 483.940034][T20079] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 483.948437][T20079] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 483.956415][T20079] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 483.964374][T20079] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100680c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x80, 0x20) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000a00)) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = dup(r3) getdents64(r3, 0x0, 0x2000) write$P9_RFSYNC(r3, &(0x7f0000000240)={0x7, 0x33, 0x2}, 0x7) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r5 = openat$incfs(r4, &(0x7f0000000280)='.pending_reads\x00', 0x400000, 0x42) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x810, r5, 0xc36e6000) sendfile(r1, r2, 0x0, 0x7fffffff) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r6, r1, 0x0, 0xffffff04) [ 483.972332][T20079] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 483.980552][T20079] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 483.992484][T20070] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000080002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 484.045804][T20088] loop2: detected capacity change from 0 to 4 [ 484.052714][T20088] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 69) [ 484.086989][T20091] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 484.087952][T20094] loop1: detected capacity change from 0 to 1054 [ 484.115593][T20088] loop2: detected capacity change from 0 to 4 [ 484.122416][T20088] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001006c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 484.131098][T20094] EXT4-fs (loop1): inodes count not valid: 134217760 vs 32 [ 484.142139][T20096] loop3: detected capacity change from 0 to 4 [ 484.163722][T20096] FAULT_INJECTION: forcing a failure. [ 484.163722][T20096] name failslab, interval 1, probability 0, space 0, times 0 [ 484.176419][T20096] CPU: 0 PID: 20096 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 484.184912][T20096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.194971][T20096] Call Trace: [ 484.198256][T20096] dump_stack_lvl+0xd6/0x122 [ 484.202891][T20096] dump_stack+0x11/0x1b [ 484.207119][T20096] should_fail+0x23c/0x250 [ 484.211637][T20096] ? __list_lru_init+0x332/0x680 [ 484.216741][T20096] __should_failslab+0x81/0x90 [ 484.221525][T20096] should_failslab+0x5/0x20 [ 484.226083][T20096] kmem_cache_alloc_trace+0x52/0x350 [ 484.231472][T20096] ? __list_lru_init+0x332/0x680 [ 484.236455][T20096] __list_lru_init+0x332/0x680 [ 484.241226][T20096] alloc_super+0x490/0x520 [ 484.245687][T20096] ? mount_bdev+0x290/0x290 [ 484.250197][T20096] sget+0x189/0x370 [ 484.254056][T20096] ? test_bdev_super+0x30/0x30 [ 484.258829][T20096] mount_bdev+0xd3/0x290 [ 484.263088][T20096] ? ext4_mount+0x40/0x40 [ 484.267475][T20096] ? ext4_errno_to_code+0x110/0x110 [ 484.272751][T20096] ext4_mount+0x2d/0x40 [ 484.277074][T20096] legacy_get_tree+0x70/0xc0 [ 484.281764][T20096] vfs_get_tree+0x4a/0x1a0 [ 484.286227][T20096] path_mount+0x11cf/0x1c40 [ 484.290732][T20096] __se_sys_mount+0x24b/0x2f0 [ 484.295430][T20096] ? __this_cpu_preempt_check+0x18/0x20 [ 484.301091][T20096] __x64_sys_mount+0x63/0x70 [ 484.305690][T20096] do_syscall_64+0x44/0xa0 [ 484.310117][T20096] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.316047][T20096] RIP: 0033:0x7f41f344b01a [ 484.320472][T20096] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 484.340092][T20096] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 484.348553][T20096] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 484.356534][T20096] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 484.364682][T20096] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 484.372665][T20096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 484.380647][T20096] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000090002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 70) [ 484.415868][T20101] loop2: detected capacity change from 0 to 4 [ 484.423846][T20101] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 484.432404][T20102] loop1: detected capacity change from 0 to 1054 [ 484.446492][T20102] EXT4-fs (loop1): inodes count not valid: 150994976 vs 32 [ 484.488039][T20105] loop3: detected capacity change from 0 to 4 [ 484.496769][T20105] FAULT_INJECTION: forcing a failure. [ 484.496769][T20105] name failslab, interval 1, probability 0, space 0, times 0 [ 484.509554][T20105] CPU: 1 PID: 20105 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 484.517987][T20105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.528042][T20105] Call Trace: [ 484.531351][T20105] dump_stack_lvl+0xd6/0x122 [ 484.535993][T20105] dump_stack+0x11/0x1b [ 484.540162][T20105] should_fail+0x23c/0x250 [ 484.544590][T20105] ? __list_lru_init+0x332/0x680 [ 484.549529][T20105] __should_failslab+0x81/0x90 [ 484.554363][T20105] should_failslab+0x5/0x20 [ 484.558916][T20105] kmem_cache_alloc_trace+0x52/0x350 [ 484.564203][T20105] ? __list_lru_init+0x332/0x680 [ 484.569144][T20105] __list_lru_init+0x332/0x680 [ 484.573950][T20105] alloc_super+0x490/0x520 [ 484.578372][T20105] ? mount_bdev+0x290/0x290 [ 484.582970][T20105] sget+0x189/0x370 [ 484.586868][T20105] ? test_bdev_super+0x30/0x30 [ 484.591632][T20105] mount_bdev+0xd3/0x290 [ 484.595888][T20105] ? ext4_mount+0x40/0x40 [ 484.600486][T20105] ? ext4_errno_to_code+0x110/0x110 [ 484.605718][T20105] ext4_mount+0x2d/0x40 [ 484.609882][T20105] legacy_get_tree+0x70/0xc0 [ 484.614464][T20105] vfs_get_tree+0x4a/0x1a0 [ 484.618895][T20105] path_mount+0x11cf/0x1c40 [ 484.623396][T20105] __se_sys_mount+0x24b/0x2f0 [ 484.628268][T20105] ? __this_cpu_preempt_check+0x18/0x20 [ 484.633821][T20105] __x64_sys_mount+0x63/0x70 [ 484.638440][T20105] do_syscall_64+0x44/0xa0 [ 484.642864][T20105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.648938][T20105] RIP: 0033:0x7f41f344b01a [ 484.653394][T20105] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 484.673006][T20105] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:39:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100740c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000a0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 484.681515][T20105] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 484.689480][T20105] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 484.697513][T20105] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 484.705480][T20105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 484.713639][T20105] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001007a0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 71) [ 484.763214][T20108] loop1: detected capacity change from 0 to 1054 [ 484.772783][T20109] loop2: detected capacity change from 0 to 4 [ 484.772908][T20108] EXT4-fs (loop1): inodes count not valid: 167772192 vs 32 [ 484.782621][T20109] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 484.845353][T20114] loop3: detected capacity change from 0 to 4 [ 484.861953][T20114] FAULT_INJECTION: forcing a failure. [ 484.861953][T20114] name failslab, interval 1, probability 0, space 0, times 0 [ 484.864390][T20117] loop2: detected capacity change from 0 to 4 [ 484.874607][T20114] CPU: 1 PID: 20114 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 484.881781][T20117] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 484.889051][T20114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.889067][T20114] Call Trace: [ 484.889075][T20114] dump_stack_lvl+0xd6/0x122 [ 484.914835][T20114] dump_stack+0x11/0x1b [ 484.919050][T20114] should_fail+0x23c/0x250 [ 484.923512][T20114] ? __list_lru_init+0x332/0x680 [ 484.928471][T20114] __should_failslab+0x81/0x90 [ 484.933249][T20114] should_failslab+0x5/0x20 [ 484.937798][T20114] kmem_cache_alloc_trace+0x52/0x350 [ 484.943176][T20114] ? __list_lru_init+0x332/0x680 [ 484.948124][T20114] __list_lru_init+0x332/0x680 [ 484.953208][T20114] alloc_super+0x490/0x520 [ 484.957635][T20114] ? mount_bdev+0x290/0x290 [ 484.962249][T20114] sget+0x189/0x370 [ 484.966178][T20114] ? test_bdev_super+0x30/0x30 [ 484.971042][T20114] mount_bdev+0xd3/0x290 [ 484.975286][T20114] ? ext4_mount+0x40/0x40 [ 484.979698][T20114] ? ext4_errno_to_code+0x110/0x110 [ 484.984910][T20114] ext4_mount+0x2d/0x40 [ 484.989123][T20114] legacy_get_tree+0x70/0xc0 [ 484.993718][T20114] vfs_get_tree+0x4a/0x1a0 [ 484.998144][T20114] path_mount+0x11cf/0x1c40 [ 485.002652][T20114] __se_sys_mount+0x24b/0x2f0 [ 485.007373][T20114] ? __this_cpu_preempt_check+0x18/0x20 [ 485.012930][T20114] __x64_sys_mount+0x63/0x70 [ 485.017521][T20114] do_syscall_64+0x44/0xa0 [ 485.021934][T20114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.027833][T20114] RIP: 0033:0x7f41f344b01a [ 485.032256][T20114] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 485.051920][T20114] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.060341][T20114] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 485.068367][T20114] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 485.076602][T20114] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 485.084631][T20114] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:39:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000b0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r2) getdents64(r2, 0x0, 0x2000) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x7, 0x5, 0x80, 0x3, 0x0, 0x6, 0x42120, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x5}, 0x4, 0xffffffffffffff81, 0x3, 0x4, 0x9, 0x200, 0xbd4, 0x0, 0x7, 0x0, 0x7f}, 0x0, 0x3, r2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)=0x1) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = eventfd2(0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f0000000540)=ANY=[@ANYBLOB="0100"/12, @ANYRES32=r3, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00 .Ifile1\x00']) io_submit(0x0, 0x6, &(0x7f00000018c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000240)="f86257f6539f80483a6e5d755652d90c7d06984f33b57b417d87dbd22e2d50f60832ff155be2345db261470e79da14b1f052c37498fd24f2e353afbfb03de87121a5ad955f334d472d6bb62413ed911caedc4bf9ae7d83b0ed8d4090830adc19cd720f8e26bc5e911adb3b62f58e0eabf092ab8fbc3d43b85e2bc22a4518b415", 0x80, 0xfffffffffffffffb, 0x0, 0x6, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x5, r3, &(0x7f00000002c0)="7695aa5004394983ab799cd519a8f20b9621", 0x12, 0x3ff, 0x0, 0x1, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xee, r4, &(0x7f0000000440)="5486f1ebdf0945aac3c02e8da213b38874a0a4543376a3d796411678d0520e243361ef5ab7278fa349b1bd5cf60da2347d2b902fc6b8a700db7e46e635a68e415e11094bf921811db712276420336340feea5d5d4ef907d4148abd87152e495e5a61efe24282e447741e9b34f25bc6b2528e0c2811d576a4babe537151ac4fd0079af19321acb6c24383896848879614204d610d4f0c2e", 0x97, 0xfffffffffffffc00}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f0000000380)="21710dce4b5f4e2eb8cd825e7b046e8a1c958d8ba97b88d9c379c24880909622d92047fde0ab", 0x26, 0x20, 0x0, 0x1, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x4, r3, &(0x7f0000000800)="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", 0x1000, 0x2, 0x0, 0x2, r7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x6, r2, &(0x7f0000001800)="bac1c1bf3d05b9cc22a889a084a7283ad79e57eb1939fcdf55f6efcb6f19728a1628c5cd5f246cb18b0e46292228c0edab01462068c724a9f0b6a7a797238c638a637d486751f601aa6f9532b6b686cdb47fb5bb6ab19e5679de6dc41d62bb14878fb9678daf99d93cf1bab5f7f4da03c89c0ec44c3179f4719cb6f2fbf8fe2fcd80e80dd324da2723fdec81f64ca13f78a7e24d2e045e6247e97bfd5d7421", 0x9f, 0x3e, 0x0, 0x3, r0}]) [ 485.092600][T20114] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 72) 12:39:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100fe0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 485.135414][T20117] loop2: detected capacity change from 0 to 4 [ 485.142036][T20117] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 485.158397][T20124] loop1: detected capacity change from 0 to 1054 [ 485.171624][T20124] EXT4-fs (loop1): inodes count not valid: 184549408 vs 32 12:39:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 485.209396][T20130] loop2: detected capacity change from 0 to 4 [ 485.217031][T20132] loop3: detected capacity change from 0 to 4 [ 485.224112][T20130] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 485.237723][T20132] FAULT_INJECTION: forcing a failure. [ 485.237723][T20132] name failslab, interval 1, probability 0, space 0, times 0 [ 485.250397][T20132] CPU: 1 PID: 20132 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 485.258817][T20132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.268868][T20132] Call Trace: [ 485.272145][T20132] dump_stack_lvl+0xd6/0x122 [ 485.276804][T20132] dump_stack+0x11/0x1b [ 485.280964][T20132] should_fail+0x23c/0x250 [ 485.285390][T20132] ? __list_lru_init+0x332/0x680 [ 485.290331][T20132] __should_failslab+0x81/0x90 [ 485.295207][T20132] should_failslab+0x5/0x20 [ 485.299726][T20132] kmem_cache_alloc_trace+0x52/0x350 [ 485.305103][T20132] ? __list_lru_init+0x332/0x680 [ 485.310045][T20132] __list_lru_init+0x332/0x680 [ 485.314839][T20132] alloc_super+0x490/0x520 [ 485.319302][T20132] ? mount_bdev+0x290/0x290 [ 485.323801][T20132] sget+0x189/0x370 [ 485.327610][T20132] ? test_bdev_super+0x30/0x30 [ 485.332429][T20132] mount_bdev+0xd3/0x290 [ 485.336685][T20132] ? ext4_mount+0x40/0x40 [ 485.341022][T20132] ? ext4_errno_to_code+0x110/0x110 [ 485.346306][T20132] ext4_mount+0x2d/0x40 [ 485.350531][T20132] legacy_get_tree+0x70/0xc0 [ 485.355123][T20132] vfs_get_tree+0x4a/0x1a0 [ 485.359598][T20132] path_mount+0x11cf/0x1c40 [ 485.364131][T20132] __se_sys_mount+0x24b/0x2f0 [ 485.368805][T20132] __x64_sys_mount+0x63/0x70 [ 485.373390][T20132] do_syscall_64+0x44/0xa0 [ 485.377888][T20132] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.383825][T20132] RIP: 0033:0x7f41f344b01a [ 485.388431][T20132] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 485.408115][T20132] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.416577][T20132] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 485.424614][T20132] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 485.432582][T20132] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 485.440559][T20132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 485.448531][T20132] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100078b000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 485.463073][T20137] loop1: detected capacity change from 0 to 1054 [ 485.491734][T20137] EXT4-fs (loop1): inodes count not valid: 201326624 vs 32 [ 485.509157][T20140] loop2: detected capacity change from 0 to 4 [ 485.516580][T20140] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 485.547027][T20140] loop2: detected capacity change from 0 to 4 12:39:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000d0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 73) 12:39:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100079f000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 485.670294][T20142] loop1: detected capacity change from 0 to 1054 [ 485.677449][T20144] loop2: detected capacity change from 0 to 4 [ 485.684565][T20144] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 485.693287][T20146] loop3: detected capacity change from 0 to 4 [ 485.713380][T20144] loop2: detected capacity change from 0 to 4 [ 485.719941][T20144] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 485.729815][T20142] EXT4-fs (loop1): inodes count not valid: 218103840 vs 32 [ 485.737849][T20146] FAULT_INJECTION: forcing a failure. [ 485.737849][T20146] name failslab, interval 1, probability 0, space 0, times 0 [ 485.750695][T20146] CPU: 0 PID: 20146 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 485.759117][T20146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.769204][T20146] Call Trace: [ 485.772485][T20146] dump_stack_lvl+0xd6/0x122 [ 485.777098][T20146] dump_stack+0x11/0x1b [ 485.781343][T20146] should_fail+0x23c/0x250 [ 485.785778][T20146] ? __list_lru_init+0x332/0x680 [ 485.790727][T20146] __should_failslab+0x81/0x90 [ 485.795507][T20146] should_failslab+0x5/0x20 [ 485.800121][T20146] kmem_cache_alloc_trace+0x52/0x350 [ 485.805499][T20146] ? __list_lru_init+0x332/0x680 [ 485.810505][T20146] __list_lru_init+0x332/0x680 [ 485.815364][T20146] alloc_super+0x490/0x520 [ 485.819798][T20146] ? mount_bdev+0x290/0x290 [ 485.824416][T20146] sget+0x189/0x370 [ 485.828332][T20146] ? test_bdev_super+0x30/0x30 [ 485.833104][T20146] mount_bdev+0xd3/0x290 [ 485.837360][T20146] ? ext4_mount+0x40/0x40 [ 485.841701][T20146] ? ext4_errno_to_code+0x110/0x110 [ 485.846990][T20146] ext4_mount+0x2d/0x40 [ 485.851215][T20146] legacy_get_tree+0x70/0xc0 [ 485.855828][T20146] vfs_get_tree+0x4a/0x1a0 [ 485.860291][T20146] path_mount+0x11cf/0x1c40 [ 485.864801][T20146] __se_sys_mount+0x24b/0x2f0 [ 485.869486][T20146] ? __this_cpu_preempt_check+0x18/0x20 [ 485.875124][T20146] __x64_sys_mount+0x63/0x70 [ 485.879730][T20146] do_syscall_64+0x44/0xa0 [ 485.884189][T20146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.890095][T20146] RIP: 0033:0x7f41f344b01a [ 485.894511][T20146] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:39:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000a000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 485.914124][T20146] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.922590][T20146] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 485.930565][T20146] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 485.938546][T20146] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 485.946555][T20146] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 485.954614][T20146] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000e0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 486.009231][T20136] EXT4-fs warning: 3 callbacks suppressed [ 486.009245][T20136] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x80000, 0x142) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 74) [ 486.063070][T20153] loop1: detected capacity change from 0 to 1054 [ 486.073212][T20155] loop2: detected capacity change from 0 to 4 [ 486.081615][T20155] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 486.087813][T20153] EXT4-fs (loop1): inodes count not valid: 234881056 vs 32 [ 486.121396][T20159] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 486.135679][T20155] loop2: detected capacity change from 0 to 4 [ 486.137472][T20161] loop3: detected capacity change from 0 to 4 [ 486.142825][T20157] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 486.166081][T20161] FAULT_INJECTION: forcing a failure. 12:39:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000f0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 486.166081][T20161] name failslab, interval 1, probability 0, space 0, times 0 [ 486.178828][T20161] CPU: 0 PID: 20161 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 486.187259][T20161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.197324][T20161] Call Trace: [ 486.200608][T20161] dump_stack_lvl+0xd6/0x122 [ 486.205360][T20161] dump_stack+0x11/0x1b [ 486.209571][T20161] should_fail+0x23c/0x250 [ 486.214095][T20161] ? __list_lru_init+0x332/0x680 [ 486.219076][T20163] loop1: detected capacity change from 0 to 1054 [ 486.219108][T20161] __should_failslab+0x81/0x90 [ 486.227562][T20163] EXT4-fs (loop1): inodes count not valid: 251658272 vs 32 [ 486.230220][T20161] should_failslab+0x5/0x20 [ 486.230325][T20161] kmem_cache_alloc_trace+0x52/0x350 [ 486.230351][T20161] ? __list_lru_init+0x332/0x680 [ 486.252415][T20161] __list_lru_init+0x332/0x680 [ 486.257392][T20161] alloc_super+0x490/0x520 [ 486.261824][T20161] ? mount_bdev+0x290/0x290 [ 486.266338][T20161] sget+0x189/0x370 [ 486.270195][T20161] ? test_bdev_super+0x30/0x30 [ 486.274997][T20161] mount_bdev+0xd3/0x290 [ 486.279259][T20161] ? ext4_mount+0x40/0x40 [ 486.283601][T20161] ? ext4_errno_to_code+0x110/0x110 [ 486.288845][T20161] ext4_mount+0x2d/0x40 [ 486.293075][T20161] legacy_get_tree+0x70/0xc0 [ 486.297749][T20161] vfs_get_tree+0x4a/0x1a0 [ 486.302159][T20161] path_mount+0x11cf/0x1c40 [ 486.306654][T20161] __se_sys_mount+0x24b/0x2f0 [ 486.311424][T20161] __x64_sys_mount+0x63/0x70 [ 486.316085][T20161] do_syscall_64+0x44/0xa0 [ 486.320553][T20161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 486.326468][T20161] RIP: 0033:0x7f41f344b01a [ 486.330907][T20161] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 486.350517][T20161] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.359015][T20161] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a 12:39:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100008b070000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000100002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 486.366993][T20161] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 486.374954][T20161] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 486.383018][T20161] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 486.391003][T20161] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 486.448060][T20167] loop1: detected capacity change from 0 to 1054 [ 486.456840][T20167] EXT4-fs (loop1): inodes count not valid: 268435488 vs 32 [ 486.498583][T20169] loop2: detected capacity change from 0 to 4 [ 486.505622][T20169] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 486.537017][T20169] loop2: detected capacity change from 0 to 4 12:39:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 75) [ 486.543975][T20169] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000110002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100009f070000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 486.588388][T20172] loop3: detected capacity change from 0 to 4 [ 486.602193][T20172] FAULT_INJECTION: forcing a failure. [ 486.602193][T20172] name failslab, interval 1, probability 0, space 0, times 0 [ 486.614863][T20172] CPU: 0 PID: 20172 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 486.623314][T20172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.633382][T20172] Call Trace: [ 486.636671][T20172] dump_stack_lvl+0xd6/0x122 [ 486.641430][T20172] dump_stack+0x11/0x1b [ 486.645606][T20172] should_fail+0x23c/0x250 [ 486.650052][T20172] ? __list_lru_init+0x332/0x680 [ 486.655004][T20172] __should_failslab+0x81/0x90 [ 486.660016][T20172] should_failslab+0x5/0x20 [ 486.664536][T20172] kmem_cache_alloc_trace+0x52/0x350 [ 486.669835][T20172] ? __list_lru_init+0x332/0x680 [ 486.674876][T20172] __list_lru_init+0x332/0x680 [ 486.679708][T20172] alloc_super+0x490/0x520 [ 486.684142][T20172] ? mount_bdev+0x290/0x290 [ 486.688850][T20172] sget+0x189/0x370 [ 486.692725][T20172] ? test_bdev_super+0x30/0x30 [ 486.697592][T20172] mount_bdev+0xd3/0x290 [ 486.701854][T20172] ? ext4_mount+0x40/0x40 [ 486.706212][T20172] ? ext4_errno_to_code+0x110/0x110 [ 486.711696][T20172] ext4_mount+0x2d/0x40 [ 486.716021][T20172] legacy_get_tree+0x70/0xc0 [ 486.720826][T20172] vfs_get_tree+0x4a/0x1a0 [ 486.725351][T20172] path_mount+0x11cf/0x1c40 [ 486.729894][T20172] __se_sys_mount+0x24b/0x2f0 [ 486.734592][T20172] ? __this_cpu_preempt_check+0x18/0x20 [ 486.740316][T20172] __x64_sys_mount+0x63/0x70 [ 486.744915][T20172] do_syscall_64+0x44/0xa0 [ 486.749343][T20172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 486.755252][T20172] RIP: 0033:0x7f41f344b01a [ 486.759670][T20172] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 486.779385][T20172] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.787946][T20172] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 486.796142][T20172] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 486.804341][T20172] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 486.812322][T20172] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 486.820296][T20172] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 486.828901][T20176] loop1: detected capacity change from 0 to 1054 [ 486.837574][T20176] EXT4-fs (loop1): inodes count not valid: 285212704 vs 32 [ 486.852601][T20180] loop2: detected capacity change from 0 to 4 [ 486.860509][T20180] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 486.878281][T20173] loop1: detected capacity change from 0 to 1054 12:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 76) [ 486.886966][T20180] loop2: detected capacity change from 0 to 4 [ 486.893497][T20180] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 486.923751][T20182] loop3: detected capacity change from 0 to 4 [ 486.930915][T20182] FAULT_INJECTION: forcing a failure. [ 486.930915][T20182] name failslab, interval 1, probability 0, space 0, times 0 [ 486.943773][T20182] CPU: 0 PID: 20182 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 486.952198][T20182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.962370][T20182] Call Trace: [ 486.965655][T20182] dump_stack_lvl+0xd6/0x122 [ 486.970260][T20182] dump_stack+0x11/0x1b [ 486.974435][T20182] should_fail+0x23c/0x250 [ 486.978941][T20182] ? __list_lru_init+0x332/0x680 [ 486.983923][T20182] __should_failslab+0x81/0x90 [ 486.988703][T20182] should_failslab+0x5/0x20 [ 486.993222][T20182] kmem_cache_alloc_trace+0x52/0x350 [ 486.998566][T20182] ? __list_lru_init+0x332/0x680 [ 487.003539][T20182] __list_lru_init+0x332/0x680 [ 487.008345][T20182] alloc_super+0x490/0x520 [ 487.012749][T20182] ? mount_bdev+0x290/0x290 [ 487.017243][T20182] sget+0x189/0x370 [ 487.021060][T20182] ? test_bdev_super+0x30/0x30 [ 487.025813][T20182] mount_bdev+0xd3/0x290 [ 487.030116][T20182] ? ext4_mount+0x40/0x40 [ 487.034436][T20182] ? ext4_errno_to_code+0x110/0x110 [ 487.039640][T20182] ext4_mount+0x2d/0x40 [ 487.043806][T20182] legacy_get_tree+0x70/0xc0 [ 487.048543][T20182] vfs_get_tree+0x4a/0x1a0 [ 487.052952][T20182] path_mount+0x11cf/0x1c40 [ 487.057443][T20182] __se_sys_mount+0x24b/0x2f0 [ 487.062110][T20182] __x64_sys_mount+0x63/0x70 [ 487.066720][T20182] do_syscall_64+0x44/0xa0 [ 487.071130][T20182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.077016][T20182] RIP: 0033:0x7f41f344b01a [ 487.081433][T20182] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 487.101118][T20182] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.110299][T20182] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 487.118312][T20182] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 487.126322][T20182] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000fff0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 487.134285][T20182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 487.142245][T20182] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="200000000001004c0c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$FITHAW(r0, 0xc0045878) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r2 = syz_open_dev$evdev(&(0x7f00000002c0), 0x5, 0x3b1100) dup2(r2, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 77) 12:39:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 487.186503][T20187] loop2: detected capacity change from 0 to 4 [ 487.193486][T20187] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 487.201528][T20173] EXT4-fs (loop1): inodes count not valid: 285212704 vs 32 12:39:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000120002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 487.237781][T20187] loop2: detected capacity change from 0 to 4 [ 487.245038][T20190] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 487.249600][T20193] loop3: detected capacity change from 0 to 4 [ 487.265519][T20193] FAULT_INJECTION: forcing a failure. [ 487.265519][T20193] name failslab, interval 1, probability 0, space 0, times 0 [ 487.278179][T20193] CPU: 1 PID: 20193 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 487.286617][T20193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.296670][T20193] Call Trace: [ 487.299933][T20193] dump_stack_lvl+0xd6/0x122 [ 487.304508][T20193] dump_stack+0x11/0x1b [ 487.308648][T20193] should_fail+0x23c/0x250 [ 487.313062][T20193] ? __list_lru_init+0x332/0x680 [ 487.318054][T20193] __should_failslab+0x81/0x90 [ 487.322801][T20193] should_failslab+0x5/0x20 [ 487.327294][T20193] kmem_cache_alloc_trace+0x52/0x350 [ 487.330170][T20197] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 487.332688][T20193] ? __list_lru_init+0x332/0x680 [ 487.332717][T20193] __list_lru_init+0x332/0x680 [ 487.355398][T20193] alloc_super+0x490/0x520 [ 487.359978][T20193] ? mount_bdev+0x290/0x290 [ 487.364540][T20193] sget+0x189/0x370 [ 487.368502][T20193] ? test_bdev_super+0x30/0x30 [ 487.373294][T20193] mount_bdev+0xd3/0x290 [ 487.377694][T20193] ? ext4_mount+0x40/0x40 [ 487.382011][T20193] ? ext4_errno_to_code+0x110/0x110 [ 487.387212][T20193] ext4_mount+0x2d/0x40 [ 487.391644][T20193] legacy_get_tree+0x70/0xc0 [ 487.396215][T20193] vfs_get_tree+0x4a/0x1a0 [ 487.400775][T20193] path_mount+0x11cf/0x1c40 [ 487.405279][T20193] __se_sys_mount+0x24b/0x2f0 [ 487.409937][T20193] __x64_sys_mount+0x63/0x70 [ 487.414555][T20193] do_syscall_64+0x44/0xa0 [ 487.419031][T20193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.424913][T20193] RIP: 0033:0x7f41f344b01a [ 487.429387][T20193] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 487.449005][T20193] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.457404][T20193] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 487.465419][T20193] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 487.473377][T20193] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 12:39:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c020000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 487.481350][T20193] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 487.489364][T20193] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 78) [ 487.532942][T20202] loop1: detected capacity change from 0 to 1054 [ 487.540076][T20202] EXT4-fs (loop1): inodes count not valid: 301989920 vs 32 12:39:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000220002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 487.579710][T20205] loop3: detected capacity change from 0 to 4 [ 487.587595][T20205] FAULT_INJECTION: forcing a failure. [ 487.587595][T20205] name failslab, interval 1, probability 0, space 0, times 0 [ 487.600297][T20205] CPU: 1 PID: 20205 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 487.608846][T20205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.618907][T20205] Call Trace: [ 487.620209][T20211] loop1: detected capacity change from 0 to 1054 [ 487.622207][T20205] dump_stack_lvl+0xd6/0x122 [ 487.633176][T20205] dump_stack+0x11/0x1b [ 487.637342][T20205] should_fail+0x23c/0x250 [ 487.641762][T20205] ? __list_lru_init+0x332/0x680 [ 487.646713][T20205] __should_failslab+0x81/0x90 [ 487.651581][T20205] should_failslab+0x5/0x20 [ 487.656280][T20205] kmem_cache_alloc_trace+0x52/0x350 [ 487.661603][T20205] ? __list_lru_init+0x332/0x680 [ 487.666543][T20205] __list_lru_init+0x332/0x680 [ 487.671351][T20205] alloc_super+0x490/0x520 [ 487.675763][T20205] ? mount_bdev+0x290/0x290 [ 487.680273][T20205] sget+0x189/0x370 [ 487.684084][T20205] ? test_bdev_super+0x30/0x30 [ 487.688851][T20205] mount_bdev+0xd3/0x290 [ 487.693105][T20205] ? ext4_mount+0x40/0x40 [ 487.697437][T20205] ? ext4_errno_to_code+0x110/0x110 [ 487.702714][T20205] ext4_mount+0x2d/0x40 [ 487.704549][T20213] loop2: detected capacity change from 0 to 4 [ 487.706876][T20205] legacy_get_tree+0x70/0xc0 [ 487.706899][T20205] vfs_get_tree+0x4a/0x1a0 [ 487.706921][T20205] path_mount+0x11cf/0x1c40 [ 487.706940][T20205] __se_sys_mount+0x24b/0x2f0 [ 487.726074][T20211] EXT4-fs (loop1): inodes count not valid: 570425376 vs 32 [ 487.726487][T20205] __x64_sys_mount+0x63/0x70 [ 487.726513][T20205] do_syscall_64+0x44/0xa0 [ 487.731373][T20213] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 487.738362][T20205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 487.738394][T20205] RIP: 0033:0x7f41f344b01a [ 487.765523][T20205] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 487.785131][T20205] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 487.793554][T20205] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 487.801584][T20205] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 487.809552][T20205] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 487.817518][T20205] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 487.825489][T20205] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000250002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c030000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 79) [ 487.863699][T20212] loop2: detected capacity change from 0 to 4 [ 487.872477][T20212] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 487.895529][T20215] loop1: detected capacity change from 0 to 1054 [ 487.904608][T20215] EXT4-fs (loop1): inodes count not valid: 620757024 vs 32 [ 487.948197][T20217] loop3: detected capacity change from 0 to 4 [ 487.957088][T20217] FAULT_INJECTION: forcing a failure. [ 487.957088][T20217] name failslab, interval 1, probability 0, space 0, times 0 [ 487.969736][T20217] CPU: 0 PID: 20217 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 487.978211][T20217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.988264][T20217] Call Trace: [ 487.991538][T20217] dump_stack_lvl+0xd6/0x122 [ 487.996137][T20217] dump_stack+0x11/0x1b [ 488.000423][T20217] should_fail+0x23c/0x250 [ 488.004840][T20217] __should_failslab+0x81/0x90 [ 488.009686][T20217] should_failslab+0x5/0x20 [ 488.014232][T20217] kmem_cache_alloc_node_trace+0x61/0x310 [ 488.020100][T20217] ? should_fail+0xd6/0x250 [ 488.024685][T20217] ? __kmalloc_node+0x30/0x40 [ 488.029361][T20217] __kmalloc_node+0x30/0x40 [ 488.033871][T20217] kvmalloc_node+0x81/0x110 [ 488.038379][T20217] __list_lru_init+0x2d7/0x680 [ 488.043142][T20217] alloc_super+0x4bf/0x520 [ 488.047558][T20217] ? mount_bdev+0x290/0x290 [ 488.052096][T20217] sget+0x189/0x370 [ 488.055956][T20217] ? test_bdev_super+0x30/0x30 [ 488.060758][T20217] mount_bdev+0xd3/0x290 [ 488.065092][T20217] ? ext4_mount+0x40/0x40 [ 488.069510][T20217] ? ext4_errno_to_code+0x110/0x110 [ 488.074720][T20217] ext4_mount+0x2d/0x40 [ 488.078899][T20217] legacy_get_tree+0x70/0xc0 [ 488.083487][T20217] vfs_get_tree+0x4a/0x1a0 [ 488.087967][T20217] path_mount+0x11cf/0x1c40 [ 488.092469][T20217] __se_sys_mount+0x24b/0x2f0 [ 488.097198][T20217] ? __this_cpu_preempt_check+0x18/0x20 [ 488.102846][T20217] __x64_sys_mount+0x63/0x70 [ 488.107432][T20217] do_syscall_64+0x44/0xa0 [ 488.111930][T20217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.117897][T20217] RIP: 0033:0x7f41f344b01a [ 488.122393][T20217] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 488.142046][T20217] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.150474][T20217] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 488.158454][T20217] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 488.166461][T20217] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 488.174437][T20217] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 488.182438][T20217] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 488.200033][T20220] loop2: detected capacity change from 0 to 4 [ 488.207110][T20220] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 488.218340][T20219] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000002e0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c040000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 80) 12:39:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x604080, 0x128) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 488.325028][T20224] loop1: detected capacity change from 0 to 1054 [ 488.337342][T20227] loop3: detected capacity change from 0 to 4 [ 488.344131][T20227] FAULT_INJECTION: forcing a failure. [ 488.344131][T20227] name failslab, interval 1, probability 0, space 0, times 0 [ 488.356906][T20227] CPU: 1 PID: 20227 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 488.365322][T20227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.375394][T20227] Call Trace: [ 488.378677][T20227] dump_stack_lvl+0xd6/0x122 [ 488.383432][T20227] dump_stack+0x11/0x1b [ 488.387602][T20227] should_fail+0x23c/0x250 [ 488.388228][T20230] loop2: detected capacity change from 0 to 4 [ 488.392091][T20227] ? __list_lru_init+0x332/0x680 [ 488.392117][T20227] __should_failslab+0x81/0x90 [ 488.399627][T20231] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 488.403124][T20227] should_failslab+0x5/0x20 [ 488.403154][T20227] kmem_cache_alloc_trace+0x52/0x350 [ 488.403180][T20227] ? __kmalloc_node+0x30/0x40 [ 488.403204][T20227] __list_lru_init+0x332/0x680 [ 488.440042][T20227] alloc_super+0x4bf/0x520 [ 488.444506][T20227] ? mount_bdev+0x290/0x290 [ 488.449071][T20227] sget+0x189/0x370 [ 488.452897][T20227] ? test_bdev_super+0x30/0x30 [ 488.457712][T20227] mount_bdev+0xd3/0x290 [ 488.462012][T20227] ? ext4_mount+0x40/0x40 [ 488.466348][T20227] ? ext4_errno_to_code+0x110/0x110 [ 488.471595][T20227] ext4_mount+0x2d/0x40 [ 488.475800][T20227] legacy_get_tree+0x70/0xc0 [ 488.475893][T20230] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 488.480386][T20227] vfs_get_tree+0x4a/0x1a0 [ 488.480423][T20227] path_mount+0x11cf/0x1c40 [ 488.488491][T20224] EXT4-fs (loop1): inodes count not valid: 771751968 vs 32 [ 488.492658][T20227] __se_sys_mount+0x24b/0x2f0 [ 488.492682][T20227] __x64_sys_mount+0x63/0x70 [ 488.513643][T20227] do_syscall_64+0x44/0xa0 [ 488.518064][T20227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.523982][T20227] RIP: 0033:0x7f41f344b01a [ 488.528394][T20227] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 488.549082][T20227] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.557531][T20227] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 488.565555][T20227] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 12:39:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) ioctl$FITHAW(r0, 0xc0045878) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = syz_open_dev$evdev(&(0x7f00000002c0), 0x5, 0x3b1100) dup2(r2, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 488.573534][T20227] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 488.581506][T20227] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 488.589477][T20227] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c050000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000002f0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 488.658295][T20229] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 488.672618][T20235] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 488.677100][T20239] loop1: detected capacity change from 0 to 1054 [ 488.694460][T20240] loop2: detected capacity change from 0 to 4 12:39:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 81) 12:39:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x20, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x2, 0x4, 0x0, 0x500000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x4000, 0x2) renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', r2, &(0x7f0000000280)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) r3 = syz_io_uring_setup(0x187, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000540), &(0x7f0000000100)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180), 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x99a, r4}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r0, 0x0, 0xffffff04) [ 488.701592][T20240] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 488.718227][T20239] EXT4-fs (loop1): inodes count not valid: 788529184 vs 32 [ 488.741183][T20242] loop3: detected capacity change from 0 to 4 [ 488.748178][T20242] FAULT_INJECTION: forcing a failure. [ 488.748178][T20242] name failslab, interval 1, probability 0, space 0, times 0 [ 488.760890][T20242] CPU: 1 PID: 20242 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 488.769334][T20242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.779479][T20242] Call Trace: [ 488.782751][T20242] dump_stack_lvl+0xd6/0x122 [ 488.787373][T20242] dump_stack+0x11/0x1b [ 488.791660][T20242] should_fail+0x23c/0x250 [ 488.796194][T20242] ? __list_lru_init+0x332/0x680 [ 488.801138][T20242] __should_failslab+0x81/0x90 [ 488.805967][T20242] should_failslab+0x5/0x20 [ 488.810530][T20242] kmem_cache_alloc_trace+0x52/0x350 [ 488.815819][T20242] ? __list_lru_init+0x332/0x680 [ 488.820839][T20242] __list_lru_init+0x332/0x680 [ 488.825658][T20242] alloc_super+0x4bf/0x520 [ 488.830121][T20242] ? mount_bdev+0x290/0x290 [ 488.834635][T20242] sget+0x189/0x370 [ 488.838509][T20242] ? test_bdev_super+0x30/0x30 [ 488.843280][T20242] mount_bdev+0xd3/0x290 [ 488.847575][T20242] ? ext4_mount+0x40/0x40 [ 488.851914][T20242] ? ext4_errno_to_code+0x110/0x110 [ 488.857185][T20242] ext4_mount+0x2d/0x40 [ 488.861360][T20242] legacy_get_tree+0x70/0xc0 [ 488.866026][T20242] vfs_get_tree+0x4a/0x1a0 [ 488.870498][T20242] path_mount+0x11cf/0x1c40 [ 488.874997][T20242] __se_sys_mount+0x24b/0x2f0 [ 488.879677][T20242] __x64_sys_mount+0x63/0x70 [ 488.880953][T20248] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 488.884312][T20242] do_syscall_64+0x44/0xa0 [ 488.884339][T20242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 488.884367][T20242] RIP: 0033:0x7f41f344b01a [ 488.911981][T20242] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 488.931695][T20242] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 488.940138][T20242] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 488.948143][T20242] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 12:39:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c060000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000360002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 488.956111][T20242] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 488.964079][T20242] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 488.972115][T20242] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x84) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x20) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001000000, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 82) [ 489.021661][T20252] loop1: detected capacity change from 0 to 1054 [ 489.033043][T20253] loop2: detected capacity change from 0 to 4 [ 489.040244][T20253] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 489.044253][T20252] EXT4-fs (loop1): inodes count not valid: 905969696 vs 32 [ 489.072239][T20257] loop3: detected capacity change from 0 to 4 [ 489.079699][T20253] loop2: detected capacity change from 0 to 4 [ 489.080061][T20257] FAULT_INJECTION: forcing a failure. [ 489.080061][T20257] name failslab, interval 1, probability 0, space 0, times 0 [ 489.087850][T20253] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 489.098458][T20257] CPU: 1 PID: 20257 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 489.098485][T20257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.098497][T20257] Call Trace: [ 489.098505][T20257] dump_stack_lvl+0xd6/0x122 [ 489.098600][T20257] dump_stack+0x11/0x1b [ 489.098623][T20257] should_fail+0x23c/0x250 [ 489.141213][T20257] ? __list_lru_init+0x332/0x680 [ 489.146218][T20257] __should_failslab+0x81/0x90 [ 489.150976][T20257] should_failslab+0x5/0x20 [ 489.155476][T20257] kmem_cache_alloc_trace+0x52/0x350 [ 489.160805][T20257] ? __list_lru_init+0x332/0x680 [ 489.165888][T20257] __list_lru_init+0x332/0x680 [ 489.170716][T20257] alloc_super+0x4bf/0x520 [ 489.175153][T20257] ? mount_bdev+0x290/0x290 [ 489.179645][T20257] sget+0x189/0x370 [ 489.183522][T20257] ? test_bdev_super+0x30/0x30 [ 489.188294][T20257] mount_bdev+0xd3/0x290 [ 489.192612][T20257] ? ext4_mount+0x40/0x40 [ 489.196956][T20257] ? ext4_errno_to_code+0x110/0x110 [ 489.202146][T20257] ext4_mount+0x2d/0x40 [ 489.206306][T20257] legacy_get_tree+0x70/0xc0 [ 489.210898][T20257] vfs_get_tree+0x4a/0x1a0 [ 489.215365][T20257] path_mount+0x11cf/0x1c40 [ 489.219991][T20257] __se_sys_mount+0x24b/0x2f0 [ 489.224657][T20257] __x64_sys_mount+0x63/0x70 [ 489.229235][T20257] do_syscall_64+0x44/0xa0 [ 489.233641][T20257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 489.239654][T20257] RIP: 0033:0x7f41f344b01a [ 489.244056][T20257] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 489.263737][T20257] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:39:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000370002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 489.272224][T20257] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 489.280195][T20257] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 489.288177][T20257] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 489.296165][T20257] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 489.304147][T20257] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c070000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 489.349371][T20260] loop1: detected capacity change from 0 to 1054 [ 489.358301][T20260] EXT4-fs (loop1): inodes count not valid: 922746912 vs 32 [ 489.416264][T20262] loop2: detected capacity change from 0 to 4 [ 489.423211][T20262] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:50 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x604080, 0x128) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 83) 12:39:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000380002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 489.466932][T20262] loop2: detected capacity change from 0 to 4 12:39:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c080000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 489.537712][T20269] loop3: detected capacity change from 0 to 4 [ 489.548791][T20271] loop1: detected capacity change from 0 to 1054 [ 489.549554][T20269] FAULT_INJECTION: forcing a failure. [ 489.549554][T20269] name failslab, interval 1, probability 0, space 0, times 0 [ 489.559433][T20271] EXT4-fs (loop1): inodes count not valid: 939524128 vs 32 [ 489.567810][T20269] CPU: 0 PID: 20269 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 12:39:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 489.567836][T20269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.567848][T20269] Call Trace: [ 489.596801][T20269] dump_stack_lvl+0xd6/0x122 [ 489.601482][T20269] dump_stack+0x11/0x1b [ 489.605654][T20269] should_fail+0x23c/0x250 [ 489.610197][T20269] ? __list_lru_init+0x332/0x680 [ 489.615206][T20269] __should_failslab+0x81/0x90 [ 489.620055][T20269] should_failslab+0x5/0x20 [ 489.624572][T20269] kmem_cache_alloc_trace+0x52/0x350 [ 489.629877][T20269] ? __list_lru_init+0x332/0x680 [ 489.634904][T20269] __list_lru_init+0x332/0x680 [ 489.639752][T20269] alloc_super+0x4bf/0x520 [ 489.644185][T20269] ? mount_bdev+0x290/0x290 [ 489.648798][T20269] sget+0x189/0x370 [ 489.652641][T20269] ? test_bdev_super+0x30/0x30 [ 489.657470][T20269] mount_bdev+0xd3/0x290 [ 489.661758][T20269] ? ext4_mount+0x40/0x40 [ 489.666096][T20269] ? ext4_errno_to_code+0x110/0x110 [ 489.671304][T20269] ext4_mount+0x2d/0x40 [ 489.675575][T20269] legacy_get_tree+0x70/0xc0 [ 489.680162][T20269] vfs_get_tree+0x4a/0x1a0 [ 489.684667][T20269] path_mount+0x11cf/0x1c40 [ 489.689230][T20269] __se_sys_mount+0x24b/0x2f0 [ 489.693913][T20269] ? __this_cpu_preempt_check+0x18/0x20 [ 489.699489][T20269] __x64_sys_mount+0x63/0x70 [ 489.704233][T20269] do_syscall_64+0x44/0xa0 [ 489.708727][T20269] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 489.714674][T20269] RIP: 0033:0x7f41f344b01a [ 489.719097][T20269] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 489.738706][T20269] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 489.747187][T20269] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 489.755213][T20269] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 489.763208][T20269] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 489.771181][T20269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 489.779153][T20269] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 489.855061][T20279] loop2: detected capacity change from 0 to 4 [ 489.862159][T20279] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000390002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = signalfd(r2, &(0x7f0000000180)={[0x5]}, 0x8) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x7) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:39:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 84) 12:39:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c090000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 489.906734][T20279] loop2: detected capacity change from 0 to 4 [ 489.913384][T20279] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 489.943699][T20283] loop1: detected capacity change from 0 to 1054 [ 489.950770][T20286] loop3: detected capacity change from 0 to 4 [ 489.954105][T20283] EXT4-fs (loop1): inodes count not valid: 956301344 vs 32 [ 489.965856][T20286] FAULT_INJECTION: forcing a failure. [ 489.965856][T20286] name failslab, interval 1, probability 0, space 0, times 0 [ 489.978652][T20286] CPU: 1 PID: 20286 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 489.987169][T20286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.997203][T20286] Call Trace: [ 490.000467][T20286] dump_stack_lvl+0xd6/0x122 [ 490.005084][T20286] dump_stack+0x11/0x1b [ 490.009381][T20286] should_fail+0x23c/0x250 [ 490.013777][T20286] ? __list_lru_init+0x332/0x680 [ 490.018698][T20286] __should_failslab+0x81/0x90 [ 490.023443][T20286] should_failslab+0x5/0x20 [ 490.027929][T20286] kmem_cache_alloc_trace+0x52/0x350 [ 490.033264][T20286] ? __list_lru_init+0x332/0x680 [ 490.038198][T20286] __list_lru_init+0x332/0x680 [ 490.042995][T20286] alloc_super+0x4bf/0x520 [ 490.047437][T20286] ? mount_bdev+0x290/0x290 [ 490.051988][T20286] sget+0x189/0x370 [ 490.055777][T20286] ? test_bdev_super+0x30/0x30 [ 490.060526][T20286] mount_bdev+0xd3/0x290 [ 490.064930][T20286] ? ext4_mount+0x40/0x40 [ 490.069333][T20286] ? ext4_errno_to_code+0x110/0x110 [ 490.074576][T20286] ext4_mount+0x2d/0x40 [ 490.078719][T20286] legacy_get_tree+0x70/0xc0 [ 490.083356][T20286] vfs_get_tree+0x4a/0x1a0 [ 490.087754][T20286] path_mount+0x11cf/0x1c40 [ 490.092341][T20286] __se_sys_mount+0x24b/0x2f0 [ 490.096999][T20286] ? __this_cpu_preempt_check+0x18/0x20 [ 490.102551][T20286] __x64_sys_mount+0x63/0x70 [ 490.107124][T20286] do_syscall_64+0x44/0xa0 [ 490.111536][T20286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.117522][T20286] RIP: 0033:0x7f41f344b01a [ 490.121993][T20286] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 490.141670][T20286] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.150070][T20286] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 490.158024][T20286] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 490.165979][T20286] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 490.174019][T20286] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 490.182135][T20286] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 490.254783][T20290] loop2: detected capacity change from 0 to 4 [ 490.261760][T20290] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 490.296604][T20290] loop2: detected capacity change from 0 to 4 [ 490.303378][T20290] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x604080, 0x128) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000003a0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 85) 12:39:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0a0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 490.424266][T20295] loop1: detected capacity change from 0 to 1054 [ 490.425301][T20296] loop3: detected capacity change from 0 to 4 [ 490.441080][T20296] FAULT_INJECTION: forcing a failure. [ 490.441080][T20296] name failslab, interval 1, probability 0, space 0, times 0 [ 490.453754][T20296] CPU: 0 PID: 20296 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 490.462168][T20296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.472231][T20296] Call Trace: [ 490.475519][T20296] dump_stack_lvl+0xd6/0x122 [ 490.480121][T20296] dump_stack+0x11/0x1b [ 490.484366][T20296] should_fail+0x23c/0x250 [ 490.488787][T20296] ? __list_lru_init+0x332/0x680 [ 490.493398][T20302] loop2: detected capacity change from 0 to 4 [ 490.493727][T20296] __should_failslab+0x81/0x90 [ 490.504517][T20296] should_failslab+0x5/0x20 [ 490.509109][T20296] kmem_cache_alloc_trace+0x52/0x350 [ 490.514422][T20296] ? __list_lru_init+0x332/0x680 [ 490.519391][T20296] __list_lru_init+0x332/0x680 [ 490.524164][T20296] alloc_super+0x4bf/0x520 [ 490.528592][T20296] ? mount_bdev+0x290/0x290 [ 490.533102][T20296] sget+0x189/0x370 [ 490.536913][T20296] ? test_bdev_super+0x30/0x30 [ 490.541685][T20296] mount_bdev+0xd3/0x290 [ 490.545931][T20296] ? ext4_mount+0x40/0x40 [ 490.550270][T20296] ? ext4_errno_to_code+0x110/0x110 [ 490.555511][T20296] ext4_mount+0x2d/0x40 [ 490.559673][T20296] legacy_get_tree+0x70/0xc0 [ 490.564268][T20296] vfs_get_tree+0x4a/0x1a0 [ 490.568708][T20296] path_mount+0x11cf/0x1c40 [ 490.573247][T20296] __se_sys_mount+0x24b/0x2f0 [ 490.577927][T20296] __x64_sys_mount+0x63/0x70 [ 490.582602][T20296] do_syscall_64+0x44/0xa0 [ 490.587021][T20296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.593224][T20296] RIP: 0033:0x7f41f344b01a [ 490.597640][T20296] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 490.617332][T20296] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 490.625746][T20296] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 490.633858][T20296] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 490.642031][T20296] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 490.650083][T20296] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 490.658060][T20296] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 490.666893][T20295] EXT4-fs (loop1): inodes count not valid: 973078560 vs 32 12:39:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:52 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000003b0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 490.675892][T20302] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0b0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 86) 12:39:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffbe, 0x0, @perf_config_ext={0x5}, 0x10002, 0x0, 0x0, 0x4, 0x800000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000240)={0x3, 0x80, 0x6a, 0x3, 0x3, 0x8, 0x0, 0x7fff, 0xe504, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x4, @perf_config_ext={0xfffffffff0fdaf19, 0x1f}, 0x8b4, 0x4, 0xfff, 0x9, 0x401, 0x62, 0x3, 0x0, 0x1096, 0x0, 0x7}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 490.765791][T20308] loop1: detected capacity change from 0 to 1054 [ 490.780411][T20311] loop2: detected capacity change from 0 to 4 [ 490.787653][T20311] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 490.796084][T20308] EXT4-fs (loop1): inodes count not valid: 989855776 vs 32 12:39:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 490.815057][T20313] loop3: detected capacity change from 0 to 4 [ 490.826933][T20313] FAULT_INJECTION: forcing a failure. [ 490.826933][T20313] name failslab, interval 1, probability 0, space 0, times 0 [ 490.827075][T20314] loop2: detected capacity change from 0 to 4 [ 490.839624][T20313] CPU: 1 PID: 20313 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 490.854053][T20313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.856932][T20314] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 490.864108][T20313] Call Trace: [ 490.864120][T20313] dump_stack_lvl+0xd6/0x122 [ 490.864152][T20313] dump_stack+0x11/0x1b [ 490.884420][T20313] should_fail+0x23c/0x250 [ 490.888846][T20313] ? __list_lru_init+0x332/0x680 [ 490.893772][T20313] __should_failslab+0x81/0x90 [ 490.898540][T20313] should_failslab+0x5/0x20 [ 490.903059][T20313] kmem_cache_alloc_trace+0x52/0x350 [ 490.908346][T20313] ? __list_lru_init+0x332/0x680 [ 490.913350][T20313] __list_lru_init+0x332/0x680 [ 490.918105][T20313] alloc_super+0x4bf/0x520 [ 490.922545][T20313] ? mount_bdev+0x290/0x290 [ 490.927092][T20313] sget+0x189/0x370 [ 490.930889][T20313] ? test_bdev_super+0x30/0x30 [ 490.935722][T20313] mount_bdev+0xd3/0x290 [ 490.939971][T20313] ? ext4_mount+0x40/0x40 [ 490.944360][T20313] ? ext4_errno_to_code+0x110/0x110 [ 490.949577][T20313] ext4_mount+0x2d/0x40 [ 490.953773][T20313] legacy_get_tree+0x70/0xc0 [ 490.958390][T20313] vfs_get_tree+0x4a/0x1a0 [ 490.962813][T20313] path_mount+0x11cf/0x1c40 [ 490.967378][T20313] __se_sys_mount+0x24b/0x2f0 [ 490.972055][T20313] ? __this_cpu_preempt_check+0x18/0x20 [ 490.977637][T20313] __x64_sys_mount+0x63/0x70 [ 490.982223][T20313] do_syscall_64+0x44/0xa0 [ 490.986694][T20313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 490.992687][T20313] RIP: 0033:0x7f41f344b01a [ 490.997128][T20313] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 491.016808][T20313] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.025214][T20313] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 491.033194][T20313] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 491.041179][T20313] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 491.049136][T20313] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 491.057183][T20313] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 491.074348][T20316] EXT4-fs warning: 7 callbacks suppressed [ 491.074385][T20316] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x604080, 0x128) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0c0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 87) 12:39:52 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000480002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 491.333596][T20322] loop3: detected capacity change from 0 to 4 [ 491.344803][T20327] loop2: detected capacity change from 0 to 4 [ 491.351967][T20327] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 491.360364][T20326] loop1: detected capacity change from 0 to 1054 [ 491.375836][T20326] EXT4-fs (loop1): inodes count not valid: 1207959584 vs 32 [ 491.383923][T20322] FAULT_INJECTION: forcing a failure. [ 491.383923][T20322] name failslab, interval 1, probability 0, space 0, times 0 [ 491.386532][T20329] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 491.396605][T20322] CPU: 0 PID: 20322 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 491.417869][T20322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.427924][T20322] Call Trace: [ 491.431202][T20322] dump_stack_lvl+0xd6/0x122 [ 491.435859][T20322] dump_stack+0x11/0x1b [ 491.440026][T20322] should_fail+0x23c/0x250 [ 491.444520][T20322] ? __list_lru_init+0x332/0x680 [ 491.449514][T20322] __should_failslab+0x81/0x90 [ 491.454289][T20322] should_failslab+0x5/0x20 [ 491.458870][T20322] kmem_cache_alloc_trace+0x52/0x350 [ 491.464245][T20322] ? __list_lru_init+0x332/0x680 [ 491.469281][T20322] __list_lru_init+0x332/0x680 [ 491.474060][T20322] alloc_super+0x4bf/0x520 [ 491.478521][T20322] ? mount_bdev+0x290/0x290 [ 491.483028][T20322] sget+0x189/0x370 [ 491.486858][T20322] ? test_bdev_super+0x30/0x30 [ 491.491692][T20322] mount_bdev+0xd3/0x290 [ 491.495945][T20322] ? ext4_mount+0x40/0x40 [ 491.500346][T20322] ? ext4_errno_to_code+0x110/0x110 [ 491.505697][T20322] ext4_mount+0x2d/0x40 [ 491.509867][T20322] legacy_get_tree+0x70/0xc0 [ 491.514541][T20322] vfs_get_tree+0x4a/0x1a0 [ 491.518972][T20322] path_mount+0x11cf/0x1c40 [ 491.523545][T20322] __se_sys_mount+0x24b/0x2f0 [ 491.528228][T20322] ? __this_cpu_preempt_check+0x18/0x20 [ 491.533868][T20322] __x64_sys_mount+0x63/0x70 [ 491.538521][T20322] do_syscall_64+0x44/0xa0 [ 491.542971][T20322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.548876][T20322] RIP: 0033:0x7f41f344b01a [ 491.553348][T20322] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 491.573332][T20322] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.581766][T20322] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 491.589759][T20322] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 491.597765][T20322] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 491.605808][T20322] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 491.613787][T20322] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 491.624344][T20327] loop2: detected capacity change from 0 to 4 12:39:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000004c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 88) 12:39:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0d0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 491.687819][T20333] loop1: detected capacity change from 0 to 1054 [ 491.695585][T20333] EXT4-fs (loop1): inodes count not valid: 1275068448 vs 32 [ 491.699642][T20335] loop3: detected capacity change from 0 to 4 [ 491.709829][T20335] FAULT_INJECTION: forcing a failure. [ 491.709829][T20335] name failslab, interval 1, probability 0, space 0, times 0 [ 491.722481][T20335] CPU: 0 PID: 20335 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 491.730895][T20335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.740939][T20335] Call Trace: [ 491.744270][T20335] dump_stack_lvl+0xd6/0x122 [ 491.748935][T20335] dump_stack+0x11/0x1b [ 491.753122][T20335] should_fail+0x23c/0x250 [ 491.757711][T20335] ? __list_lru_init+0x332/0x680 [ 491.762730][T20335] __should_failslab+0x81/0x90 [ 491.767580][T20335] should_failslab+0x5/0x20 [ 491.772078][T20335] kmem_cache_alloc_trace+0x52/0x350 [ 491.777370][T20335] ? __list_lru_init+0x332/0x680 [ 491.782345][T20335] __list_lru_init+0x332/0x680 [ 491.787107][T20335] alloc_super+0x4bf/0x520 [ 491.791543][T20335] ? mount_bdev+0x290/0x290 [ 491.796044][T20335] sget+0x189/0x370 [ 491.799862][T20335] ? test_bdev_super+0x30/0x30 [ 491.804630][T20335] mount_bdev+0xd3/0x290 [ 491.808991][T20335] ? ext4_mount+0x40/0x40 [ 491.813347][T20335] ? ext4_errno_to_code+0x110/0x110 [ 491.818639][T20335] ext4_mount+0x2d/0x40 [ 491.822819][T20335] legacy_get_tree+0x70/0xc0 [ 491.827427][T20335] vfs_get_tree+0x4a/0x1a0 [ 491.831852][T20335] path_mount+0x11cf/0x1c40 [ 491.836428][T20335] __se_sys_mount+0x24b/0x2f0 [ 491.841110][T20335] __x64_sys_mount+0x63/0x70 [ 491.845757][T20335] do_syscall_64+0x44/0xa0 [ 491.850207][T20335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.856102][T20335] RIP: 0033:0x7f41f344b01a [ 491.860516][T20335] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 491.880172][T20335] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 491.888607][T20335] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 491.896730][T20335] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 491.904735][T20335] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 491.908689][T20337] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 491.912710][T20335] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:39:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) r4 = syz_open_dev$vcsa(&(0x7f0000000180), 0xfffffffffffffe01, 0x8000) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) r7 = socket$netlink(0x10, 0x3, 0x7) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000001800)={0x2, 0x4, 0x6, 0x0, 0x0, [{{r6}, 0x1}, {{r7}, 0x10000000000000}, {{r2}, 0x1}, {{r8}, 0x1cb}, {{}, 0x8}, {{r0}, 0x7}]}) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000240)=""/204, 0xcc}, {&(0x7f0000000340)=""/98, 0x62}, {&(0x7f0000000440)=""/56, 0x38}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000480)=""/5, 0x5}], 0x5, 0x1, 0x8) 12:39:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000540002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 491.912730][T20335] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 491.973460][T20342] loop2: detected capacity change from 0 to 4 [ 491.974274][T20343] loop1: detected capacity change from 0 to 1054 [ 491.980920][T20342] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 491.994618][T20343] EXT4-fs (loop1): inodes count not valid: 1409286176 vs 32 [ 492.002908][T20339] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0e0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 89) [ 492.020345][T20342] loop2: detected capacity change from 0 to 4 [ 492.049569][T20345] loop3: detected capacity change from 0 to 4 [ 492.056207][T20345] FAULT_INJECTION: forcing a failure. [ 492.056207][T20345] name failslab, interval 1, probability 0, space 0, times 0 [ 492.068936][T20345] CPU: 1 PID: 20345 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 492.077361][T20345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.087398][T20345] Call Trace: [ 492.090659][T20345] dump_stack_lvl+0xd6/0x122 [ 492.095291][T20345] dump_stack+0x11/0x1b [ 492.099488][T20345] should_fail+0x23c/0x250 [ 492.103994][T20345] ? __list_lru_init+0x332/0x680 [ 492.108927][T20345] __should_failslab+0x81/0x90 [ 492.113693][T20345] should_failslab+0x5/0x20 [ 492.118180][T20345] kmem_cache_alloc_trace+0x52/0x350 [ 492.123626][T20345] ? __list_lru_init+0x332/0x680 [ 492.128443][ T23] audit: type=1400 audit(1635856793.534:246): avc: denied { ioctl } for pid=20338 comm="syz-executor.5" path="socket:[59172]" dev="sockfs" ino=59172 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 492.128574][T20345] __list_lru_init+0x332/0x680 [ 492.159137][T20345] alloc_super+0x4bf/0x520 [ 492.163562][T20345] ? mount_bdev+0x290/0x290 [ 492.168051][T20345] sget+0x189/0x370 [ 492.171916][T20345] ? test_bdev_super+0x30/0x30 [ 492.176663][T20345] mount_bdev+0xd3/0x290 [ 492.180891][T20345] ? ext4_mount+0x40/0x40 [ 492.185202][T20345] ? ext4_errno_to_code+0x110/0x110 [ 492.190416][T20345] ext4_mount+0x2d/0x40 [ 492.194925][T20345] legacy_get_tree+0x70/0xc0 [ 492.199599][T20345] vfs_get_tree+0x4a/0x1a0 [ 492.204007][T20345] path_mount+0x11cf/0x1c40 [ 492.208618][T20345] __se_sys_mount+0x24b/0x2f0 [ 492.213333][T20345] __x64_sys_mount+0x63/0x70 [ 492.217935][T20345] do_syscall_64+0x44/0xa0 [ 492.222389][T20345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 492.228353][T20345] RIP: 0033:0x7f41f344b01a [ 492.232770][T20345] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 492.252459][T20345] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.260891][T20345] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 492.268850][T20345] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 492.276817][T20345] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 492.284775][T20345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 492.292730][T20345] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000550002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 90) [ 492.342308][T20351] loop1: detected capacity change from 0 to 1054 [ 492.349589][T20351] EXT4-fs (loop1): inodes count not valid: 1426063392 vs 32 12:39:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000560002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 492.383052][T20355] loop2: detected capacity change from 0 to 4 [ 492.390163][T20355] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 492.393024][T20357] loop3: detected capacity change from 0 to 4 [ 492.406252][T20357] FAULT_INJECTION: forcing a failure. [ 492.406252][T20357] name failslab, interval 1, probability 0, space 0, times 0 [ 492.418903][T20357] CPU: 1 PID: 20357 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 492.424918][T20361] loop1: detected capacity change from 0 to 1054 [ 492.427356][T20357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.427371][T20357] Call Trace: [ 492.427379][T20357] dump_stack_lvl+0xd6/0x122 [ 492.427427][T20357] dump_stack+0x11/0x1b [ 492.455759][T20357] should_fail+0x23c/0x250 [ 492.460183][T20357] ? ext4_fill_super+0x3d/0x78f0 [ 492.465114][T20357] __should_failslab+0x81/0x90 [ 492.469913][T20357] should_failslab+0x5/0x20 [ 492.474410][T20357] __kmalloc_track_caller+0x6d/0x370 [ 492.479686][T20357] ? bdev_name+0x1e1/0x240 [ 492.484140][T20357] kstrdup+0x31/0x70 [ 492.488046][T20357] ext4_fill_super+0x3d/0x78f0 [ 492.492803][T20357] ? vsnprintf+0xe8f/0xed0 [ 492.497258][T20357] ? snprintf+0x83/0xb0 [ 492.501411][T20357] ? set_blocksize+0x197/0x270 [ 492.506196][T20357] mount_bdev+0x1e8/0x290 [ 492.510580][T20357] ? ext4_mount+0x40/0x40 [ 492.515026][T20357] ? ext4_errno_to_code+0x110/0x110 [ 492.520305][T20357] ext4_mount+0x2d/0x40 [ 492.524470][T20357] legacy_get_tree+0x70/0xc0 [ 492.529061][T20357] vfs_get_tree+0x4a/0x1a0 [ 492.533492][T20357] path_mount+0x11cf/0x1c40 [ 492.537986][T20357] __se_sys_mount+0x24b/0x2f0 [ 492.542648][T20357] __x64_sys_mount+0x63/0x70 [ 492.547238][T20357] do_syscall_64+0x44/0xa0 [ 492.551645][T20357] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 492.557529][T20357] RIP: 0033:0x7f41f344b01a [ 492.561987][T20357] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 492.581579][T20357] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 492.590152][T20357] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 492.598111][T20357] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 492.606092][T20357] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 492.614069][T20357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 492.622026][T20357] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0f0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c100000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 492.636022][T20361] EXT4-fs (loop1): inodes count not valid: 1442840608 vs 32 [ 492.671094][T20364] loop2: detected capacity change from 0 to 4 [ 492.678251][T20364] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000005c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 492.724748][T20367] loop2: detected capacity change from 0 to 4 [ 492.731894][T20367] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 492.756692][T20367] loop2: detected capacity change from 0 to 4 [ 492.761325][T20369] loop1: detected capacity change from 0 to 1054 [ 492.770397][T20369] EXT4-fs (loop1): inodes count not valid: 1543503904 vs 32 12:39:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c110000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 91) 12:39:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat(r0, &(0x7f0000000180)='./file1/file0\x00', r0, &(0x7f0000000240)='./file0\x00') renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000280)={{0x0, 0x0, 0x100000001, 0x81, 0x9, 0xffffffffffffb402, 0x3, 0xbd9, 0x80000001, 0x7f, 0xfffffffd, 0x2, 0x7, 0x5}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000600002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 492.799427][T20346] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 492.847410][T20373] loop2: detected capacity change from 0 to 4 [ 492.854698][T20373] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 492.863009][T20374] loop3: detected capacity change from 0 to 4 [ 492.867107][T20378] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 492.870218][T20374] FAULT_INJECTION: forcing a failure. [ 492.870218][T20374] name failslab, interval 1, probability 0, space 0, times 0 [ 492.894992][T20374] CPU: 0 PID: 20374 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 492.903452][T20374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.913530][T20374] Call Trace: [ 492.916844][T20374] dump_stack_lvl+0xd6/0x122 [ 492.921455][T20374] dump_stack+0x11/0x1b [ 492.925657][T20374] should_fail+0x23c/0x250 [ 492.930093][T20374] ? ext4_fill_super+0x62/0x78f0 [ 492.935129][T20374] __should_failslab+0x81/0x90 [ 492.939905][T20374] should_failslab+0x5/0x20 [ 492.944563][T20374] kmem_cache_alloc_trace+0x52/0x350 [ 492.949860][T20374] ext4_fill_super+0x62/0x78f0 [ 492.954643][T20374] ? vsnprintf+0xe8f/0xed0 [ 492.959208][T20374] ? snprintf+0x83/0xb0 [ 492.963380][T20374] ? set_blocksize+0x197/0x270 [ 492.968204][T20374] mount_bdev+0x1e8/0x290 [ 492.972984][T20374] ? ext4_mount+0x40/0x40 [ 492.977325][T20374] ? ext4_errno_to_code+0x110/0x110 [ 492.982538][T20374] ext4_mount+0x2d/0x40 [ 492.986736][T20374] legacy_get_tree+0x70/0xc0 [ 492.991326][T20374] vfs_get_tree+0x4a/0x1a0 [ 492.995753][T20374] path_mount+0x11cf/0x1c40 [ 493.000265][T20374] __se_sys_mount+0x24b/0x2f0 [ 493.004942][T20374] __x64_sys_mount+0x63/0x70 [ 493.009617][T20374] do_syscall_64+0x44/0xa0 [ 493.014067][T20374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.019969][T20374] RIP: 0033:0x7f41f344b01a [ 493.024410][T20374] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 493.044109][T20374] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.052556][T20374] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 493.060534][T20374] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 493.068537][T20374] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 493.076532][T20374] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 493.084532][T20374] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 [ 493.093170][T20377] loop1: detected capacity change from 0 to 1054 [ 493.101593][T20373] loop2: detected capacity change from 0 to 4 [ 493.108430][T20373] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 493.116494][T20377] EXT4-fs (loop1): inodes count not valid: 1610612768 vs 32 12:39:54 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x8) 12:39:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 92) 12:39:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c120000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(0x0, 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000680002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 493.241530][T20381] loop2: detected capacity change from 0 to 4 [ 493.251997][T20381] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 493.253530][T20385] loop1: detected capacity change from 0 to 1054 [ 493.266216][T20387] loop3: detected capacity change from 0 to 4 [ 493.273339][T20387] FAULT_INJECTION: forcing a failure. [ 493.273339][T20387] name failslab, interval 1, probability 0, space 0, times 0 [ 493.286179][T20387] CPU: 1 PID: 20387 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 493.294597][T20387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.304673][T20387] Call Trace: [ 493.307951][T20387] dump_stack_lvl+0xd6/0x122 [ 493.312549][T20387] dump_stack+0x11/0x1b [ 493.315883][T20385] EXT4-fs (loop1): inodes count not valid: 1744830496 vs 32 [ 493.316708][T20387] should_fail+0x23c/0x250 [ 493.328411][T20387] ? ext4_fill_super+0x1f0/0x78f0 [ 493.333443][T20387] __should_failslab+0x81/0x90 [ 493.338348][T20387] should_failslab+0x5/0x20 [ 493.342859][T20387] kmem_cache_alloc_trace+0x52/0x350 [ 493.348186][T20387] ? ext4_fill_super+0x62/0x78f0 [ 493.353163][T20387] ext4_fill_super+0x1f0/0x78f0 [ 493.358134][T20387] ? vsnprintf+0xe8f/0xed0 [ 493.362677][T20387] ? snprintf+0x83/0xb0 [ 493.366859][T20387] ? set_blocksize+0x197/0x270 [ 493.371689][T20387] mount_bdev+0x1e8/0x290 [ 493.376052][T20387] ? ext4_mount+0x40/0x40 [ 493.380395][T20387] ? ext4_errno_to_code+0x110/0x110 [ 493.385609][T20387] ext4_mount+0x2d/0x40 [ 493.389875][T20387] legacy_get_tree+0x70/0xc0 [ 493.394464][T20387] vfs_get_tree+0x4a/0x1a0 [ 493.398941][T20387] path_mount+0x11cf/0x1c40 [ 493.403449][T20387] __se_sys_mount+0x24b/0x2f0 [ 493.408194][T20387] __x64_sys_mount+0x63/0x70 [ 493.412794][T20387] do_syscall_64+0x44/0xa0 [ 493.417279][T20387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.423256][T20387] RIP: 0033:0x7f41f344b01a [ 493.427739][T20387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 493.447389][T20387] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.455811][T20387] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 493.463792][T20387] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 493.471761][T20387] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 493.479748][T20387] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:39:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c140000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 493.487746][T20387] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000006c0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:54 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x8) [ 493.548467][T20395] loop2: detected capacity change from 0 to 4 [ 493.555515][T20395] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 493.568787][T20397] loop1: detected capacity change from 0 to 1054 [ 493.577234][T20395] loop2: detected capacity change from 0 to 4 [ 493.578903][T20397] EXT4-fs (loop1): inodes count not valid: 1811939360 vs 32 12:39:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 93) 12:39:55 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x8) [ 493.591293][T20395] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 493.629929][T20402] loop3: detected capacity change from 0 to 4 [ 493.653574][T20402] FAULT_INJECTION: forcing a failure. [ 493.653574][T20402] name failslab, interval 1, probability 0, space 0, times 0 [ 493.666291][T20402] CPU: 0 PID: 20402 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 493.674711][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.684772][T20402] Call Trace: [ 493.688058][T20402] dump_stack_lvl+0xd6/0x122 [ 493.692687][T20402] dump_stack+0x11/0x1b [ 493.696887][T20402] should_fail+0x23c/0x250 [ 493.701312][T20402] ? mempool_alloc_slab+0x16/0x20 [ 493.706344][T20402] __should_failslab+0x81/0x90 [ 493.711127][T20402] should_failslab+0x5/0x20 [ 493.715682][T20402] kmem_cache_alloc+0x4f/0x320 [ 493.720610][T20402] mempool_alloc_slab+0x16/0x20 [ 493.725474][T20402] ? mempool_free+0x130/0x130 [ 493.730175][T20402] mempool_alloc+0x9d/0x310 [ 493.734811][T20402] bio_alloc_bioset+0xcc/0x560 [ 493.739583][T20402] ? __find_get_block+0x6a1/0x9b0 [ 493.744756][T20402] submit_bh_wbc+0x133/0x320 [ 493.749423][T20402] ? __getblk_gfp+0x493/0x530 [ 493.754192][T20402] submit_bh+0x21/0x30 [ 493.758262][T20402] ? __wait_on_buffer+0x60/0x60 [ 493.763205][T20402] ext4_read_bh+0xf1/0x170 [ 493.767709][T20402] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 493.773173][T20402] ext4_fill_super+0x427/0x78f0 [ 493.778027][T20402] ? vsnprintf+0xe8f/0xed0 [ 493.782481][T20402] ? snprintf+0x83/0xb0 [ 493.786797][T20402] ? set_blocksize+0x197/0x270 [ 493.791646][T20402] mount_bdev+0x1e8/0x290 [ 493.795977][T20402] ? ext4_mount+0x40/0x40 [ 493.800381][T20402] ? ext4_errno_to_code+0x110/0x110 [ 493.805581][T20402] ext4_mount+0x2d/0x40 [ 493.809746][T20402] legacy_get_tree+0x70/0xc0 [ 493.814339][T20402] vfs_get_tree+0x4a/0x1a0 [ 493.818764][T20402] path_mount+0x11cf/0x1c40 [ 493.823271][T20402] __se_sys_mount+0x24b/0x2f0 [ 493.828013][T20402] ? __this_cpu_preempt_check+0x18/0x20 [ 493.833591][T20402] __x64_sys_mount+0x63/0x70 [ 493.838192][T20402] do_syscall_64+0x44/0xa0 [ 493.842613][T20402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 493.848555][T20402] RIP: 0033:0x7f41f344b01a [ 493.853015][T20402] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 493.872707][T20402] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 493.881180][T20402] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 493.889226][T20402] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 493.897200][T20402] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 493.905168][T20402] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 493.913139][T20402] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x20800, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r2) getdents64(r2, 0x0, 0x2000) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x75, 0x80, 0x1, 0x0, 0x0, 0x4f, 0x10, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x800, 0x9, 0x4, 0x9, 0x0, 0x0, 0x4, 0x0, 0xba7c, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xb) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:39:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c220000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:55 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000740002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:55 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) [ 493.927893][T20402] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 493.937626][T20404] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 94) [ 493.995760][T20412] loop1: detected capacity change from 0 to 1054 [ 494.005115][T20408] loop2: detected capacity change from 0 to 4 [ 494.008380][T20412] EXT4-fs (loop1): inodes count not valid: 1946157088 vs 32 [ 494.019022][T20408] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 494.030041][T20416] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 494.055016][T20419] loop3: detected capacity change from 0 to 4 [ 494.064028][T20408] loop2: detected capacity change from 0 to 4 [ 494.065118][T20419] FAULT_INJECTION: forcing a failure. [ 494.065118][T20419] name failslab, interval 1, probability 0, space 0, times 0 [ 494.082834][T20419] CPU: 1 PID: 20419 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 494.091247][T20419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.101463][T20419] Call Trace: [ 494.104728][T20419] dump_stack_lvl+0xd6/0x122 [ 494.109584][T20419] dump_stack+0x11/0x1b [ 494.113917][T20419] should_fail+0x23c/0x250 [ 494.118368][T20419] __should_failslab+0x81/0x90 [ 494.123241][T20419] should_failslab+0x5/0x20 [ 494.127742][T20419] kmem_cache_alloc_node+0x61/0x2d0 [ 494.133072][T20419] ? create_task_io_context+0x36/0x1e0 [ 494.138525][T20419] create_task_io_context+0x36/0x1e0 [ 494.143802][T20419] submit_bio_checks+0x828/0x8e0 [ 494.148737][T20419] ? blk_try_enter_queue+0xee/0x1f0 [ 494.154209][T20419] __submit_bio+0x2de/0x480 [ 494.158746][T20419] ? mempool_alloc_slab+0x16/0x20 [ 494.163985][T20419] ? mempool_alloc_slab+0x16/0x20 [ 494.169004][T20419] ? mempool_free+0x130/0x130 [ 494.173721][T20419] submit_bio_noacct+0x418/0x4e0 [ 494.178679][T20419] submit_bio+0x10c/0x180 [ 494.183071][T20419] submit_bh_wbc+0x2db/0x320 [ 494.187669][T20419] submit_bh+0x21/0x30 [ 494.191734][T20419] ? __wait_on_buffer+0x60/0x60 [ 494.196581][T20419] ext4_read_bh+0xf1/0x170 [ 494.200984][T20419] ext4_sb_bread_unmovable+0xf7/0x1a0 [ 494.206348][T20419] ext4_fill_super+0x427/0x78f0 [ 494.211222][T20419] ? vsnprintf+0xe8f/0xed0 [ 494.215630][T20419] ? snprintf+0x83/0xb0 [ 494.219852][T20419] ? set_blocksize+0x197/0x270 [ 494.224653][T20419] mount_bdev+0x1e8/0x290 [ 494.228988][T20419] ? ext4_mount+0x40/0x40 [ 494.233316][T20419] ? ext4_errno_to_code+0x110/0x110 [ 494.238533][T20419] ext4_mount+0x2d/0x40 [ 494.242719][T20419] legacy_get_tree+0x70/0xc0 [ 494.247294][T20419] vfs_get_tree+0x4a/0x1a0 [ 494.251701][T20419] path_mount+0x11cf/0x1c40 [ 494.256240][T20419] __se_sys_mount+0x24b/0x2f0 [ 494.260914][T20419] ? __this_cpu_preempt_check+0x18/0x20 [ 494.266462][T20419] __x64_sys_mount+0x63/0x70 [ 494.271084][T20419] do_syscall_64+0x44/0xa0 [ 494.275497][T20419] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.281542][T20419] RIP: 0033:0x7f41f344b01a [ 494.285941][T20419] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.305543][T20419] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.314143][T20419] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 494.322104][T20419] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 494.330068][T20419] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 494.338037][T20419] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 494.346008][T20419] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:55 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) 12:39:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xd) tkill(0xffffffffffffffff, 0x100) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000180)=0x2) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={0xffffffffffffffff, 0x3, 0xd4e3, 0x5}) r4 = syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x0) ioctl$BLKRAGET(r4, 0x1263, &(0x7f00000010c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000480)="d841dfcec0d431c3e2fb038fb6596674", 0x10) sendfile(r0, r1, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 12:39:55 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000007a0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 494.355946][T20408] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 494.356010][T20419] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:39:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c250000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 95) [ 494.404184][T20427] loop1: detected capacity change from 0 to 1054 [ 494.411285][T20427] EXT4-fs (loop1): inodes count not valid: 2046820384 vs 32 [ 494.426004][T20425] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 494.453188][T20430] loop3: detected capacity change from 0 to 4 [ 494.460037][T20430] FAULT_INJECTION: forcing a failure. [ 494.460037][T20430] name failslab, interval 1, probability 0, space 0, times 0 [ 494.472776][T20430] CPU: 0 PID: 20430 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 494.481191][T20430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.491292][T20430] Call Trace: [ 494.494589][T20430] dump_stack_lvl+0xd6/0x122 [ 494.499207][T20430] dump_stack+0x11/0x1b [ 494.503399][T20430] should_fail+0x23c/0x250 [ 494.507828][T20430] __should_failslab+0x81/0x90 [ 494.512659][T20430] should_failslab+0x5/0x20 [ 494.517155][T20430] kmem_cache_alloc_node_trace+0x61/0x310 [ 494.522928][T20430] ? __crypto_alg_lookup+0x36d/0x3a0 [ 494.528271][T20430] ? __kmalloc_node+0x30/0x40 [ 494.532958][T20430] __kmalloc_node+0x30/0x40 [ 494.537519][T20430] crypto_create_tfm_node+0x4a/0x1f0 [ 494.542819][T20430] ? crypto_alg_mod_lookup+0x397/0x4e0 [ 494.548295][T20430] crypto_alloc_tfm_node+0x100/0x290 [ 494.553597][T20430] crypto_alloc_shash+0x2b/0x30 [ 494.558452][T20430] ext4_fill_super+0x657/0x78f0 [ 494.563322][T20430] ? vsnprintf+0xe8f/0xed0 [ 494.567743][T20430] ? snprintf+0x83/0xb0 [ 494.571927][T20430] ? set_blocksize+0x197/0x270 [ 494.576697][T20430] mount_bdev+0x1e8/0x290 [ 494.581102][T20430] ? ext4_mount+0x40/0x40 [ 494.585498][T20430] ? ext4_errno_to_code+0x110/0x110 [ 494.590709][T20430] ext4_mount+0x2d/0x40 [ 494.595007][T20430] legacy_get_tree+0x70/0xc0 [ 494.599718][T20430] vfs_get_tree+0x4a/0x1a0 [ 494.604144][T20430] path_mount+0x11cf/0x1c40 [ 494.608723][T20430] __se_sys_mount+0x24b/0x2f0 [ 494.613478][T20430] __x64_sys_mount+0x63/0x70 [ 494.618070][T20430] do_syscall_64+0x44/0xa0 [ 494.622552][T20430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.628505][T20430] RIP: 0033:0x7f41f344b01a [ 494.632965][T20430] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.652631][T20430] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 494.661039][T20430] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f344b01a [ 494.669017][T20430] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f41f11c0000 [ 494.676980][T20430] RBP: 00007f41f11c0040 R08: 00007f41f11c0040 R09: 0000000020000000 [ 494.684989][T20430] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 494.693182][T20430] R13: 0000000020000040 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:56 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000830002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:56 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 494.701310][T20430] EXT4-fs (loop3): Cannot load crc32c driver. [ 494.716090][T20433] loop2: detected capacity change from 0 to 4 [ 494.723508][T20433] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:56 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:39:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c280000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 96) [ 494.750676][T20436] loop1: detected capacity change from 0 to 1054 [ 494.757477][T20436] EXT4-fs (loop1): inodes count not valid: 2197815328 vs 32 [ 494.795074][T20443] loop2: detected capacity change from 0 to 4 12:39:56 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000fe0002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 494.811958][T20445] loop3: detected capacity change from 0 to 4 [ 494.834640][T20445] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 494.858985][T20447] loop1: detected capacity change from 0 to 1054 [ 494.866775][T20447] EXT4-fs (loop1): inodes count not valid: 4261412896 vs 32 [ 494.895866][T20445] FAULT_INJECTION: forcing a failure. [ 494.895866][T20445] name failslab, interval 1, probability 0, space 0, times 0 [ 494.908492][T20445] CPU: 0 PID: 20445 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 494.917388][T20445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.927475][T20445] Call Trace: [ 494.930751][T20445] dump_stack_lvl+0xd6/0x122 [ 494.935378][T20445] dump_stack+0x11/0x1b [ 494.939600][T20445] should_fail+0x23c/0x250 [ 494.944027][T20445] ? kobject_uevent_env+0x1a7/0xc40 [ 494.949227][T20445] __should_failslab+0x81/0x90 [ 494.954104][T20445] should_failslab+0x5/0x20 [ 494.958632][T20445] kmem_cache_alloc_trace+0x52/0x350 [ 494.964126][T20445] ? kernfs_put+0x2f1/0x300 [ 494.968640][T20445] ? kernfs_put+0x39/0x300 [ 494.973081][T20445] ? dev_uevent_filter+0x70/0x70 [ 494.978028][T20445] kobject_uevent_env+0x1a7/0xc40 [ 494.983060][T20445] ? __kernfs_remove+0x6a8/0x6d0 [ 494.987999][T20445] ? kernfs_find_ns+0x30d/0x320 [ 494.992862][T20445] ? up_write+0x25/0xc0 [ 494.997034][T20445] ? kernfs_put+0x39/0x300 [ 495.001467][T20445] kobject_uevent+0x18/0x20 [ 495.005972][T20445] __loop_clr_fd+0x4a3/0x6c0 [ 495.010644][T20445] lo_ioctl+0x985/0x1270 [ 495.014949][T20445] ? __rcu_read_unlock+0x5c/0x290 [ 495.020058][T20445] ? avc_has_extended_perms+0x686/0x8a0 [ 495.025695][T20445] ? blkdev_common_ioctl+0x438/0x1120 [ 495.031145][T20445] ? do_vfs_ioctl+0x819/0x14a0 [ 495.035923][T20445] ? lo_release+0x120/0x120 [ 495.040451][T20445] blkdev_ioctl+0x20e/0x440 [ 495.044982][T20445] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 495.050461][T20445] __se_sys_ioctl+0xcb/0x140 [ 495.055063][T20445] __x64_sys_ioctl+0x3f/0x50 [ 495.059662][T20445] do_syscall_64+0x44/0xa0 [ 495.064181][T20445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.070154][T20445] RIP: 0033:0x7f41f34498a7 [ 495.074706][T20445] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.094316][T20445] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.102832][T20445] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f34498a7 [ 495.110842][T20445] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 495.118865][T20445] RBP: 00007f41f11c06bc R08: 00007f41f11c0040 R09: 0000000020000000 [ 495.126859][T20445] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 495.134875][T20445] R13: 0000000000000016 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c2e0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:56 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:56 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:39:56 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000007b0102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 97) [ 495.241971][T20434] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:56 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 495.300800][T20454] loop3: detected capacity change from 0 to 4 [ 495.310231][T20456] loop1: detected capacity change from 0 to 1054 [ 495.318301][T20458] loop2: detected capacity change from 0 to 4 [ 495.325366][T20458] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 495.334054][T20456] EXT4-fs (loop1): inodes count not valid: 2063597600 vs 32 [ 495.337899][T20454] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:39:56 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) dup(0xffffffffffffffff) 12:39:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c480000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 495.390708][T20454] FAULT_INJECTION: forcing a failure. [ 495.390708][T20454] name failslab, interval 1, probability 0, space 0, times 0 [ 495.403429][T20454] CPU: 0 PID: 20454 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 495.411846][T20454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.421988][T20454] Call Trace: [ 495.425261][T20454] dump_stack_lvl+0xd6/0x122 [ 495.429918][T20454] dump_stack+0x11/0x1b [ 495.434112][T20454] should_fail+0x23c/0x250 [ 495.438656][T20454] ? kzalloc+0x1d/0x30 [ 495.442720][T20454] __should_failslab+0x81/0x90 [ 495.447488][T20454] should_failslab+0x5/0x20 [ 495.452015][T20454] __kmalloc+0x6f/0x370 [ 495.456185][T20454] kzalloc+0x1d/0x30 [ 495.460136][T20454] kobject_get_path+0x7c/0x110 [ 495.464985][T20454] kobject_uevent_env+0x1be/0xc40 [ 495.470027][T20454] ? kernfs_put+0x2f1/0x300 [ 495.474621][T20454] kobject_uevent+0x18/0x20 [ 495.479124][T20454] __loop_clr_fd+0x4a3/0x6c0 [ 495.483712][T20454] lo_ioctl+0x985/0x1270 [ 495.487953][T20454] ? mod_objcg_mlstate+0x153/0x1a0 [ 495.493065][T20454] ? __rcu_read_unlock+0x5c/0x290 [ 495.498186][T20454] ? avc_has_extended_perms+0x686/0x8a0 [ 495.503782][T20454] ? blkdev_common_ioctl+0x438/0x1120 [ 495.509242][T20454] ? do_vfs_ioctl+0x819/0x14a0 [ 495.514037][T20454] ? lo_release+0x120/0x120 [ 495.518584][T20454] blkdev_ioctl+0x20e/0x440 [ 495.523105][T20454] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 495.528620][T20454] __se_sys_ioctl+0xcb/0x140 [ 495.533262][T20454] __x64_sys_ioctl+0x3f/0x50 [ 495.537986][T20454] do_syscall_64+0x44/0xa0 [ 495.542406][T20454] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.548359][T20454] RIP: 0033:0x7f41f34498a7 [ 495.552849][T20454] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.572462][T20454] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.580881][T20454] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f34498a7 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) dup(0xffffffffffffffff) 12:39:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000a10102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 495.588936][T20454] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 495.596907][T20454] RBP: 00007f41f11c06bc R08: 00007f41f11c0040 R09: 0000000020000000 [ 495.604891][T20454] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 495.612877][T20454] R13: 0000000000000016 R14: 00007f41f11c0000 R15: 0000000020000180 [ 495.633430][T20472] loop2: detected capacity change from 0 to 4 12:39:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 98) [ 495.641298][T20474] loop1: detected capacity change from 0 to 1054 [ 495.647866][T20472] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 495.675938][T20474] EXT4-fs (loop1): inodes count not valid: 2701131808 vs 32 [ 495.712791][T20478] loop3: detected capacity change from 0 to 4 [ 495.722546][T20478] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 495.776096][T20478] FAULT_INJECTION: forcing a failure. [ 495.776096][T20478] name failslab, interval 1, probability 0, space 0, times 0 [ 495.788849][T20478] CPU: 0 PID: 20478 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 495.797275][T20478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.807386][T20478] Call Trace: [ 495.810677][T20478] dump_stack_lvl+0xd6/0x122 [ 495.815319][T20478] dump_stack+0x11/0x1b [ 495.819668][T20478] should_fail+0x23c/0x250 [ 495.824100][T20478] ? kzalloc+0x1d/0x30 [ 495.828168][T20478] __should_failslab+0x81/0x90 [ 495.833015][T20478] should_failslab+0x5/0x20 [ 495.837536][T20478] __kmalloc+0x6f/0x370 [ 495.841703][T20478] kzalloc+0x1d/0x30 [ 495.845624][T20478] kobject_get_path+0x7c/0x110 [ 495.850391][T20478] kobject_uevent_env+0x1be/0xc40 [ 495.855490][T20478] ? kernfs_put+0x2f1/0x300 [ 495.860046][T20478] kobject_uevent+0x18/0x20 [ 495.864579][T20478] __loop_clr_fd+0x4a3/0x6c0 [ 495.869178][T20478] lo_ioctl+0x985/0x1270 [ 495.873447][T20478] ? __rcu_read_unlock+0x5c/0x290 [ 495.878539][T20478] ? avc_has_extended_perms+0x686/0x8a0 [ 495.884184][T20478] ? blkdev_common_ioctl+0x438/0x1120 [ 495.889640][T20478] ? do_vfs_ioctl+0x819/0x14a0 [ 495.894465][T20478] ? lo_release+0x120/0x120 [ 495.898973][T20478] blkdev_ioctl+0x20e/0x440 [ 495.903494][T20478] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 495.908969][T20478] __se_sys_ioctl+0xcb/0x140 [ 495.913573][T20478] __x64_sys_ioctl+0x3f/0x50 [ 495.918243][T20478] do_syscall_64+0x44/0xa0 [ 495.922673][T20478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 495.928587][T20478] RIP: 0033:0x7f41f34498a7 [ 495.933019][T20478] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.952809][T20478] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.961287][T20478] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f34498a7 [ 495.969307][T20478] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 495.977284][T20478] RBP: 00007f41f11c06bc R08: 00007f41f11c0040 R09: 0000000020000000 [ 495.985298][T20478] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 495.993277][T20478] R13: 0000000000000016 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) dup(0xffffffffffffffff) 12:39:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c4a0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 496.153990][T20482] loop2: detected capacity change from 0 to 4 [ 496.163832][T20482] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 496.177384][T20482] loop2: detected capacity change from 0 to 4 [ 496.187053][T20470] EXT4-fs warning: 1 callbacks suppressed 12:39:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000040202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:39:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 99) 12:39:57 executing program 0: syz_open_dev$loop(0x0, 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) 12:39:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c4c0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 496.187079][T20470] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:57 executing program 0: syz_open_dev$loop(0x0, 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 496.248255][T20489] loop3: detected capacity change from 0 to 4 [ 496.259419][T20491] loop1: detected capacity change from 0 to 1054 [ 496.264517][T20489] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 496.282946][T20495] loop2: detected capacity change from 0 to 4 [ 496.290229][T20495] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:57 executing program 0: syz_open_dev$loop(0x0, 0x800003ba, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 496.290296][T20491] EXT4-fs (loop1): inodes count not valid: 67108896 vs 32 [ 496.318382][T20493] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 496.331904][T20489] FAULT_INJECTION: forcing a failure. [ 496.331904][T20489] name failslab, interval 1, probability 0, space 0, times 0 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 496.344589][T20489] CPU: 1 PID: 20489 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 496.353084][T20489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.363148][T20489] Call Trace: [ 496.366535][T20489] dump_stack_lvl+0xd6/0x122 [ 496.371138][T20489] dump_stack+0x11/0x1b [ 496.375305][T20489] should_fail+0x23c/0x250 [ 496.379772][T20489] __should_failslab+0x81/0x90 [ 496.384595][T20489] should_failslab+0x5/0x20 [ 496.389132][T20489] kmem_cache_alloc_node_trace+0x61/0x310 12:39:57 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 496.394894][T20489] ? __kmalloc_node_track_caller+0x30/0x40 [ 496.400796][T20489] __kmalloc_node_track_caller+0x30/0x40 [ 496.406459][T20489] ? alloc_uevent_skb+0x5b/0x120 [ 496.411434][T20489] __alloc_skb+0x1a1/0x440 [ 496.415930][T20489] alloc_uevent_skb+0x5b/0x120 [ 496.420786][T20489] kobject_uevent_env+0x863/0xc40 [ 496.425855][T20489] ? kernfs_put+0x2f1/0x300 [ 496.430437][T20489] kobject_uevent+0x18/0x20 [ 496.434941][T20489] __loop_clr_fd+0x4a3/0x6c0 [ 496.439532][T20489] lo_ioctl+0x985/0x1270 [ 496.443880][T20489] ? __rcu_read_unlock+0x5c/0x290 [ 496.449014][T20489] ? avc_has_extended_perms+0x686/0x8a0 [ 496.454559][T20489] ? blkdev_common_ioctl+0x438/0x1120 [ 496.460100][T20489] ? do_vfs_ioctl+0x819/0x14a0 [ 496.464850][T20489] ? lo_release+0x120/0x120 [ 496.469493][T20489] blkdev_ioctl+0x20e/0x440 [ 496.474109][T20489] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 496.479552][T20489] __se_sys_ioctl+0xcb/0x140 [ 496.484347][T20489] __x64_sys_ioctl+0x3f/0x50 [ 496.489014][T20489] do_syscall_64+0x44/0xa0 [ 496.493480][T20489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 496.499394][T20489] RIP: 0033:0x7f41f34498a7 [ 496.503791][T20489] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 496.523396][T20489] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 496.531793][T20489] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f34498a7 [ 496.539746][T20489] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 496.547697][T20489] RBP: 00007f41f11c06bc R08: 00007f41f11c0040 R09: 0000000020000000 [ 496.555688][T20489] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 496.563667][T20489] R13: 0000000000000016 R14: 00007f41f11c0000 R15: 0000000020000180 12:39:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c600000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:58 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) 12:39:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) (fail_nth: 100) 12:39:58 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000e0202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 497.117013][T20508] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:39:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffff04) 12:39:58 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup(r0) [ 497.191376][T20518] loop1: detected capacity change from 0 to 1054 [ 497.199856][T20522] loop3: detected capacity change from 0 to 4 [ 497.206840][T20523] loop2: detected capacity change from 0 to 4 [ 497.213885][T20523] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.222829][T20518] EXT4-fs (loop1): inodes count not valid: 234881056 vs 32 [ 497.230219][T20522] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:39:58 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000f0202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 497.250812][T20523] loop2: detected capacity change from 0 to 4 [ 497.273307][T20522] FAULT_INJECTION: forcing a failure. [ 497.273307][T20522] name failslab, interval 1, probability 0, space 0, times 0 [ 497.286063][T20522] CPU: 1 PID: 20522 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 497.294489][T20522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.304649][T20522] Call Trace: [ 497.307929][T20522] dump_stack_lvl+0xd6/0x122 [ 497.312597][T20522] dump_stack+0x11/0x1b [ 497.316769][T20522] should_fail+0x23c/0x250 [ 497.321267][T20522] ? skb_clone+0x12c/0x1f0 [ 497.325696][T20522] __should_failslab+0x81/0x90 [ 497.330621][T20522] should_failslab+0x5/0x20 [ 497.335204][T20522] kmem_cache_alloc+0x4f/0x320 [ 497.339998][T20522] skb_clone+0x12c/0x1f0 [ 497.344247][T20522] netlink_broadcast_filtered+0x4fd/0xb60 12:39:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c680000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 497.349982][T20522] ? skb_put+0xb9/0xf0 [ 497.354123][T20522] netlink_broadcast+0x35/0x50 [ 497.358939][T20522] kobject_uevent_env+0x8c9/0xc40 [ 497.363983][T20522] ? kernfs_put+0x2f1/0x300 [ 497.368499][T20522] kobject_uevent+0x18/0x20 [ 497.373086][T20522] __loop_clr_fd+0x4a3/0x6c0 [ 497.377727][T20522] lo_ioctl+0x985/0x1270 [ 497.382085][T20522] ? mod_objcg_mlstate+0x153/0x1a0 [ 497.387214][T20522] ? __rcu_read_unlock+0x5c/0x290 [ 497.392250][T20522] ? avc_has_extended_perms+0x686/0x8a0 [ 497.397831][T20522] ? blkdev_common_ioctl+0x438/0x1120 [ 497.403219][T20522] ? do_vfs_ioctl+0x819/0x14a0 [ 497.408016][T20522] ? lo_release+0x120/0x120 [ 497.412529][T20522] blkdev_ioctl+0x20e/0x440 [ 497.417046][T20522] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 497.422513][T20522] __se_sys_ioctl+0xcb/0x140 [ 497.427245][T20522] __x64_sys_ioctl+0x3f/0x50 [ 497.431850][T20522] do_syscall_64+0x44/0xa0 [ 497.436356][T20522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 497.442260][T20522] RIP: 0033:0x7f41f34498a7 [ 497.446723][T20522] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 497.466365][T20522] RSP: 002b:00007f41f11bffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.474786][T20522] RAX: ffffffffffffffda RBX: 0000000020000540 RCX: 00007f41f34498a7 [ 497.482841][T20522] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 497.490855][T20522] RBP: 00007f41f11c06bc R08: 00007f41f11c0040 R09: 0000000020000000 12:39:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:39:58 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) r0 = open(0x0, 0x0, 0x0) dup(r0) [ 497.498876][T20522] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 497.506914][T20522] R13: 0000000000000016 R14: 00007f41f11c0000 R15: 0000000020000180 [ 497.515576][T20530] loop1: detected capacity change from 0 to 1054 [ 497.531627][T20530] EXT4-fs (loop1): inodes count not valid: 251658272 vs 32 [ 497.583893][T20534] loop3: detected capacity change from 0 to 4 [ 497.605628][T20534] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 497.625507][T20536] loop2: detected capacity change from 0 to 4 12:39:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:59 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c6c0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 497.632395][T20536] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.695969][T20541] loop2: detected capacity change from 0 to 4 [ 497.696013][T20538] loop1: detected capacity change from 0 to 1054 [ 497.702834][T20541] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.723507][T20538] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 12:39:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c740000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 497.748675][T20541] loop2: detected capacity change from 0 to 4 [ 497.755127][T20541] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.759342][T20538] EXT4-fs (loop1): orphan cleanup on readonly fs [ 497.769301][T20538] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 497.787593][T20538] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:39:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000720302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 497.816217][T20547] loop3: detected capacity change from 0 to 4 [ 497.832431][T20549] loop2: detected capacity change from 0 to 4 [ 497.839381][T20549] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.852885][T20547] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 497.886519][T20549] loop2: detected capacity change from 0 to 4 [ 497.895097][T20549] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 497.904482][T20551] loop1: detected capacity change from 0 to 1054 [ 497.911926][T20547] loop3: detected capacity change from 0 to 4 [ 497.937328][T20547] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 497.948806][T20551] EXT4-fs (loop1): inodes count not valid: 1912602656 vs 32 12:39:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffff04) 12:39:59 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c7a0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:39:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000a80302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:39:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) [ 498.080475][T20558] loop1: detected capacity change from 0 to 1054 [ 498.087368][T20559] loop3: detected capacity change from 0 to 4 [ 498.096163][T20555] loop2: detected capacity change from 0 to 4 [ 498.103286][T20555] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 498.120432][T20558] EXT4-fs (loop1): inodes count not valid: 2818572320 vs 32 12:39:59 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffff04) [ 498.135882][T20559] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 498.146604][T20555] loop2: detected capacity change from 0 to 4 [ 498.153101][T20555] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000cfe0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 498.205075][T20559] loop3: detected capacity change from 0 to 4 [ 498.212066][T20567] loop2: detected capacity change from 0 to 4 [ 498.219258][T20567] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000aa0302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 498.245934][T20559] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 498.266775][T20567] loop2: detected capacity change from 0 to 4 [ 498.268382][T20571] loop1: detected capacity change from 0 to 1054 [ 498.273537][T20567] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c7b0100ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 498.345960][T20571] EXT4-fs (loop1): inodes count not valid: 2852126752 vs 32 [ 498.366037][T20574] loop3: detected capacity change from 0 to 4 [ 498.375045][T20576] loop2: detected capacity change from 0 to 4 [ 498.381997][T20576] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:39:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000ab0302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:39:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000ca10100ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 498.420727][T20574] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 498.453567][T20579] loop1: detected capacity change from 0 to 1054 [ 498.464372][T20581] loop2: detected capacity change from 0 to 4 [ 498.471539][T20581] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 498.494669][T20579] EXT4-fs (loop1): inodes count not valid: 2868903968 vs 32 12:40:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c040200ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c10302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 498.527160][T20574] loop3: detected capacity change from 0 to 4 [ 498.527311][T20581] loop2: detected capacity change from 0 to 4 [ 498.540001][T20581] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 498.544816][T20574] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:00 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000004e700)={{0x0, 0x6, 0x4000000000000, 0xca, 0x9, 0xffff, 0x2, 0x2, 0x3, 0x80000001, 0x6, 0x7f, 0xffff, 0x5, 0x2d628315}}) r6 = open(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004f700)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {0x0, r8}], 0x7, "2621e9beb46557"}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x1, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r4}}, 0x8) sendfile(r1, r2, 0x0, 0x7fffffff) r9 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r9, r1, 0x0, 0xffffff04) 12:40:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 498.612155][T20583] loop2: detected capacity change from 0 to 4 [ 498.621242][T20583] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 498.632644][T20585] loop1: detected capacity change from 0 to 1054 [ 498.646818][T20585] EXT4-fs (loop1): inodes count not valid: 3238002720 vs 32 [ 498.659132][T20583] loop2: detected capacity change from 0 to 4 [ 498.665630][T20583] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 498.675567][T20589] loop3: detected capacity change from 0 to 4 [ 498.683575][T20589] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 498.708882][T20590] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 498.757410][T20589] loop3: detected capacity change from 0 to 4 [ 498.764580][T20589] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c2e0000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000300ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c40302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:00 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffff04) [ 499.121174][T20592] loop2: detected capacity change from 0 to 4 [ 499.127858][T20595] loop3: detected capacity change from 0 to 4 [ 499.130039][T20592] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.142498][T20596] loop1: detected capacity change from 0 to 1054 [ 499.142821][T20595] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 499.151358][T20596] EXT4-fs (loop1): inodes count not valid: 3288334368 vs 32 12:40:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x5, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xd) tkill(0xffffffffffffffff, 0x100) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000180)=0x2) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000440)={0xffffffffffffffff, 0x3, 0xd4e3, 0x5}) r4 = syz_open_dev$loop(&(0x7f0000000040), 0x5, 0x0) ioctl$BLKRAGET(r4, 0x1263, &(0x7f00000010c0)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000480)="d841dfcec0d431c3e2fb038fb6596674", 0x10) sendfile(r0, r1, 0x0, 0x7fffffff) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) [ 499.174519][T20592] loop2: detected capacity change from 0 to 4 [ 499.181077][T20592] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000cb50300ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c50302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 499.233477][T20602] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 499.254980][T20605] loop2: detected capacity change from 0 to 4 [ 499.262147][T20605] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.283962][T20595] loop3: detected capacity change from 0 to 4 [ 499.293126][T20607] loop1: detected capacity change from 0 to 1054 [ 499.300585][T20595] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 499.312154][T20605] loop2: detected capacity change from 0 to 4 [ 499.312526][T20607] EXT4-fs (loop1): inodes count not valid: 3305111584 vs 32 [ 499.319042][T20605] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000cd70300ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 499.387577][T20611] loop2: detected capacity change from 0 to 4 [ 499.394664][T20611] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.403864][T20612] loop3: detected capacity change from 0 to 4 [ 499.410892][T20612] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 499.424300][T20611] loop2: detected capacity change from 0 to 4 [ 499.456763][T20612] loop3: detected capacity change from 0 to 4 [ 499.463285][T20612] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:00 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x61) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000440)="dc34e0ed2ad80cbf1767a0019091c50292c9970e42d9dd8daca30f13bbce95288995e9870d187af3849ce92232305fb74d2031347f671b6c66d7b4aa6df4031b5a7f620f718ca988766fa08da846efb9991007b58c2148dd243a89e3c0a67654ea2c69512bc23a2582b3a9ce4a1f716d0d0a9797edcffdd58ce95fe3d330594df0f5cbfa66755591ed002be4aa18541861b237f3b81089d13cea7dbf1753bd3174b8a29d", 0xa4) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x44402) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000380)=0x2, 0x4) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240), 0x44ce, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_fscache}, {@mmap}, {@access_client}, {@access_client}, {@version_L}, {@debug={'debug', 0x3d, 0x44}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) fallocate(r4, 0x1, 0x3, 0x4) 12:40:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c60302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c020400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 499.496910][T20613] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 499.560003][T20618] loop3: detected capacity change from 0 to 4 [ 499.569978][T20620] loop2: detected capacity change from 0 to 4 [ 499.579299][T20618] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 499.579353][T20620] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.598746][T20621] loop1: detected capacity change from 0 to 1054 [ 499.605489][T20621] EXT4-fs (loop1): inodes count not valid: 3321888800 vs 32 [ 499.628781][T20620] loop2: detected capacity change from 0 to 4 [ 499.635241][T20620] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.647959][T20623] 9pnet: Insufficient options for proto=fd [ 499.654202][T20618] loop3: detected capacity change from 0 to 4 12:40:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c060400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c70302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 499.661018][T20618] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 499.671668][T20623] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 499.703172][T20625] loop2: detected capacity change from 0 to 4 [ 499.710706][T20625] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 499.721687][T20627] loop1: detected capacity change from 0 to 1054 [ 499.728552][T20627] EXT4-fs (loop1): inodes count not valid: 3338666016 vs 32 12:40:01 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffff04) 12:40:01 executing program 0: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x103382) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:40:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c100400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c80302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 500.102351][T20636] loop2: detected capacity change from 0 to 4 [ 500.109284][T20636] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 500.119310][T20635] loop1: detected capacity change from 0 to 1054 [ 500.127229][T20640] loop3: detected capacity change from 0 to 4 [ 500.128978][T20635] EXT4-fs (loop1): inodes count not valid: 3355443232 vs 32 [ 500.145855][T20636] loop2: detected capacity change from 0 to 4 12:40:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c250000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 500.148987][T20640] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 500.161869][T20636] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 500.217600][T20640] loop3: detected capacity change from 0 to 4 [ 500.226343][T20640] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x441802, 0x0) r3 = inotify_init() fsync(r3) symlinkat(&(0x7f0000000180)='./file1\x00', r2, &(0x7f0000000280)='./file1\x00') r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000c90302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000500ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 500.422144][T20630] 9pnet: Insufficient options for proto=fd [ 500.429011][T20644] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 500.466560][T20649] loop3: detected capacity change from 0 to 4 [ 500.473994][T20647] loop1: detected capacity change from 0 to 1054 [ 500.484818][T20649] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 500.492526][T20647] EXT4-fs (loop1): inodes count not valid: 3372220448 vs 32 [ 500.494615][T20653] loop2: detected capacity change from 0 to 4 12:40:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000d00302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 500.509530][T20653] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 500.518263][T20655] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 500.567685][T20649] loop3: detected capacity change from 0 to 4 [ 500.577364][T20649] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 500.588052][T20659] loop1: detected capacity change from 0 to 1054 [ 500.595387][T20659] EXT4-fs (loop1): inodes count not valid: 3489660960 vs 32 12:40:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffff04) 12:40:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000600ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:02 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000d10302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 500.881243][T20662] loop1: detected capacity change from 0 to 1054 [ 500.893314][T20666] loop3: detected capacity change from 0 to 4 [ 500.893918][T20665] loop2: detected capacity change from 0 to 4 [ 500.902071][T20666] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 500.915617][T20665] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 500.916711][T20662] EXT4-fs (loop1): inodes count not valid: 3506438176 vs 32 12:40:02 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000020402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 500.948436][T20666] loop3: detected capacity change from 0 to 4 [ 500.955457][T20666] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 500.972331][T20665] loop2: detected capacity change from 0 to 4 [ 501.011185][T20671] loop1: detected capacity change from 0 to 1054 [ 501.018323][T20671] EXT4-fs (loop1): inodes count not valid: 33554464 vs 32 [ 501.032358][T20673] loop3: detected capacity change from 0 to 4 [ 501.040835][T20673] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 501.097347][T20673] loop3: detected capacity change from 0 to 4 [ 501.104056][T20673] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c040600ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:02 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000060402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 501.330680][T20674] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:40:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffff04) 12:40:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x3, 0x5, 0xfd, 0x49, 0x0, 0x1, 0x302a4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbeca, 0x1, @perf_config_ext={0x0, 0x1}, 0x20, 0x4, 0x401, 0x9, 0x3, 0x3, 0x9c4, 0x0, 0x7, 0x0, 0x400}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000240)={{0xffffffffffffffff, 0x3, 0x2, 0x3, 0x7}, 0x7, 0xffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000800)) sendfile(r2, r0, 0x0, 0xffffff04) [ 501.389074][T20680] loop2: detected capacity change from 0 to 4 [ 501.390184][T20682] loop3: detected capacity change from 0 to 4 [ 501.401646][T20680] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 501.403966][T20682] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 501.409995][T20681] loop1: detected capacity change from 0 to 1054 [ 501.432064][T20681] EXT4-fs (loop1): inodes count not valid: 100663328 vs 32 12:40:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000700ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 501.451103][T20684] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 501.481494][T20682] loop3: detected capacity change from 0 to 4 [ 501.492641][T20689] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 501.506204][T20682] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 501.516208][T20690] loop2: detected capacity change from 0 to 4 [ 501.523291][T20690] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 501.556630][T20690] loop2: detected capacity change from 0 to 4 12:40:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x0) 12:40:03 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={'macsec0\x00', {0x2, 0x0, @broadcast}}) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000900ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xe, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 501.789761][T20695] loop3: detected capacity change from 0 to 4 [ 501.797005][T20697] loop2: detected capacity change from 0 to 4 [ 501.804101][T20697] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 501.809586][T20695] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 501.823154][T20693] loop1: detected capacity change from 0 to 1054 [ 501.830959][T20700] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 501.845041][T20693] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 501.848389][T20697] loop2: detected capacity change from 0 to 4 [ 501.856298][T20693] EXT4-fs (loop1): orphan cleanup on readonly fs [ 501.866760][T20693] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 501.878116][T20693] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000a00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 501.878040][T20697] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 501.908917][T20695] loop3: detected capacity change from 0 to 4 [ 501.917344][T20695] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xf, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 501.961204][T20693] loop1: detected capacity change from 0 to 1054 [ 501.978772][T20707] loop2: detected capacity change from 0 to 4 [ 501.985945][T20707] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 501.994673][T20709] loop3: detected capacity change from 0 to 4 [ 502.002994][T20709] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 502.026810][T20707] loop2: detected capacity change from 0 to 4 [ 502.037676][T20709] loop3: detected capacity change from 0 to 4 [ 502.044605][T20709] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000b00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 502.083828][T20711] loop1: detected capacity change from 0 to 1054 [ 502.090860][T20711] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 502.102115][T20711] EXT4-fs (loop1): orphan cleanup on readonly fs [ 502.108570][T20711] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 502.122177][T20711] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 502.152735][T20714] loop2: detected capacity change from 0 to 4 [ 502.159699][T20714] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 502.196718][T20714] loop2: detected capacity change from 0 to 4 [ 502.203237][T20714] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:03 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000040602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r2, 0x8e92c000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x800000000000, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 502.334921][T20716] loop3: detected capacity change from 0 to 4 [ 502.346989][T20720] loop1: detected capacity change from 0 to 1054 [ 502.353904][T20716] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 502.354059][T20720] EXT4-fs (loop1): inodes count not valid: 67108896 vs 32 [ 502.364614][T20719] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 502.427055][T20716] loop3: detected capacity change from 0 to 4 [ 502.443606][T20716] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x0) 12:40:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000c00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) setxattr$incfs_id(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={'0000000000000000000000000000000', 0x30}, 0x20, 0x3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x80000, 0x138) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 502.654388][T20723] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 502.683854][T20726] loop2: detected capacity change from 0 to 4 [ 502.692235][T20726] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 502.732544][T20726] loop2: detected capacity change from 0 to 4 [ 502.735741][T20731] loop3: detected capacity change from 0 to 4 [ 502.745953][T20729] loop1: detected capacity change from 0 to 1054 [ 502.752138][T20731] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 502.753723][T20729] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 12:40:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000d00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 502.771952][T20733] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 502.773212][T20729] EXT4-fs (loop1): orphan cleanup on readonly fs [ 502.791341][T20729] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 502.813055][T20731] loop3: detected capacity change from 0 to 4 [ 502.819552][T20731] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x12, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 502.819690][T20729] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 502.878303][T20739] loop2: detected capacity change from 0 to 4 [ 502.885234][T20740] loop3: detected capacity change from 0 to 4 [ 502.892447][T20739] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 502.907741][T20740] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000e00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 502.930938][T20742] loop1: detected capacity change from 0 to 1054 [ 502.938474][T20739] loop2: detected capacity change from 0 to 4 [ 502.940016][T20742] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 502.956469][T20742] EXT4-fs (loop1): orphan cleanup on readonly fs [ 502.962961][T20742] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 502.976282][T20742] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 502.980060][T20740] loop3: detected capacity change from 0 to 4 [ 502.994374][T20740] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 503.015124][T20745] loop2: detected capacity change from 0 to 4 [ 503.022423][T20745] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x22, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 503.054212][T20745] loop2: detected capacity change from 0 to 4 [ 503.080416][T20747] loop1: detected capacity change from 0 to 1054 [ 503.080581][T20749] loop3: detected capacity change from 0 to 4 [ 503.087427][T20747] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 503.094328][T20749] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 503.103666][T20747] EXT4-fs (loop1): orphan cleanup on readonly fs [ 503.118024][T20747] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 503.129266][T20747] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 503.169945][T20749] loop3: detected capacity change from 0 to 4 [ 503.187294][T20749] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000f00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 503.283736][T20752] loop2: detected capacity change from 0 to 4 [ 503.291966][T20752] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 503.317098][T20752] loop2: detected capacity change from 0 to 4 12:40:04 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x0) 12:40:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000b02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 503.549523][T20754] loop1: detected capacity change from 0 to 1054 [ 503.556664][T20754] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 503.569866][T20754] EXT4-fs (loop1): orphan cleanup on readonly fs [ 503.576263][T20754] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 503.588668][T20754] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) fadvise64(r1, 0x24, 0xf2b, 0x1) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000800)={0x0, 0x7, 0x0, [0x1, 0x8, 0x100, 0x1, 0xfffffffffffffbff], [0x3, 0x101, 0x6, 0x6, 0x1000, 0x2, 0x38000000000000, 0x7, 0x3, 0x27369f40, 0x80, 0x800, 0xfffffffffffff801, 0x3, 0x0, 0x644, 0xa, 0x98db, 0x7fffffff, 0x6, 0x9, 0x80000001, 0x8, 0x9, 0x1f, 0x3, 0xffff, 0x6, 0x8001, 0x7ff, 0xfffffffffffff800, 0x8, 0x0, 0x2, 0x9, 0x30, 0x100000000, 0x9, 0x8, 0x5, 0x40, 0x2, 0x5df2, 0x7, 0x40, 0xffff, 0x8, 0x0, 0xfffffffffffff79d, 0x81, 0x5, 0x21e2, 0x97, 0x2, 0x1, 0x2, 0xffffffff00000000, 0x0, 0x1, 0x100000000, 0x200, 0x922d, 0x7, 0x9, 0x29e, 0x3, 0x0, 0x5, 0x81, 0x583, 0xce77, 0x100, 0x736, 0xffffffff, 0x6, 0x2, 0xffff, 0xa28, 0x6, 0x7, 0x1, 0x1, 0x9, 0x4, 0x3a, 0x1, 0x7fffffff, 0x600, 0x81, 0x2, 0x6, 0xffffffffffffffff, 0x5, 0x2, 0x4, 0x5814, 0x9, 0x4, 0x0, 0x40, 0x3, 0x0, 0x7f, 0xffff, 0x8, 0xe9a, 0xff, 0x1, 0x101, 0x7, 0x1, 0x6, 0x4, 0xfffffffeffffffff, 0xd120, 0x6, 0x6, 0x0, 0xa8de, 0x3f, 0x5]}) kcmp(0x0, 0x0, 0x5, 0xffffffffffffffff, r0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000c40)={r3, "81e1a2073f8529f84ba664352a91c5a9"}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r2, 0x8e92c000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x800000000000, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) 12:40:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x25, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c041000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 503.601827][T20759] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 503.650752][T20764] loop2: detected capacity change from 0 to 4 [ 503.659667][T20768] loop3: detected capacity change from 0 to 4 [ 503.665855][T20769] loop1: detected capacity change from 0 to 1054 [ 503.666165][T20764] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 503.682278][T20768] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 503.692251][T20769] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 503.702856][T20769] EXT4-fs (loop1): orphan cleanup on readonly fs [ 503.704293][T20771] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 503.709226][T20769] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 503.709483][T20769] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000d02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 503.723073][T20773] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 503.760808][T20764] loop2: detected capacity change from 0 to 4 [ 503.768049][T20764] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 503.768305][T20768] loop3: detected capacity change from 0 to 4 [ 503.782584][T20768] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c201000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 503.815160][T20776] loop1: detected capacity change from 0 to 1054 [ 503.827491][T20776] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 503.854729][T20778] loop2: detected capacity change from 0 to 4 12:40:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x28, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 503.862787][T20778] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 503.863143][T20776] EXT4-fs (loop1): orphan cleanup on readonly fs [ 503.877020][T20776] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 503.892435][T20776] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001100ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 503.910681][T20781] loop3: detected capacity change from 0 to 4 [ 503.919728][T20778] loop2: detected capacity change from 0 to 4 [ 503.926356][T20778] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 503.937104][T20781] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 503.986796][T20783] loop2: detected capacity change from 0 to 4 [ 503.993908][T20783] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.002727][T20785] loop1: detected capacity change from 0 to 1054 [ 504.012064][T20785] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 504.023546][T20781] loop3: detected capacity change from 0 to 4 [ 504.026269][T20783] loop2: detected capacity change from 0 to 4 [ 504.030152][T20781] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 504.045727][T20783] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.060159][T20785] EXT4-fs (loop1): orphan cleanup on readonly fs [ 504.066541][T20785] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 504.092657][T20785] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 12:40:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000020e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001200ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 504.433662][T20789] loop2: detected capacity change from 0 to 4 [ 504.441405][T20789] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.456518][T20790] loop1: detected capacity change from 0 to 1054 [ 504.463934][T20790] EXT4-fs (loop1): inodes count not valid: 33554464 vs 32 [ 504.477102][T20789] loop2: detected capacity change from 0 to 4 12:40:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x0) 12:40:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2e, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) setxattr$incfs_id(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={'0000000000000000000000000000000', 0x30}, 0x20, 0x3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x80000, 0x138) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 504.562796][T20796] loop3: detected capacity change from 0 to 4 [ 504.563593][T20802] loop1: detected capacity change from 0 to 1054 [ 504.570132][T20796] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 504.584918][T20802] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 504.597024][T20802] EXT4-fs (loop1): orphan cleanup on readonly fs [ 504.603494][T20802] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 33554432 [ 504.620072][T20802] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 504.620916][T20806] loop2: detected capacity change from 0 to 4 [ 504.638568][T20796] loop3: detected capacity change from 0 to 4 [ 504.638768][T20806] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.653791][T20796] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000020f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:06 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x10, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000003a00)={0x0, 0x0, "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", "8b320c8847da53b0f0e29b987295dc5d653ddf3917b70d825371b30e1240c3813fdc654d4c9235852276a7aa0db5a01c60ab232041dffee67e8dd914aaf5fdcf35a5ad49f2ebc8c0977d075397302c24ed2aef90913620f98b7c82aa9b018a6186b68575515f9f7faf82385d86b6c88c811e80c757b860faa1aca4659e226c341b40a46a12008de5db63f7cacb03c683c2d45bd45f59787c71e40214a916c4180b60a1543cd4054ceacfe682dc40c08cfa90aad1a740af77f594708fa4c2351475bc06454e8b1b0d5a661b665b4040417b27c76a8f69d4490698bcd751e7d9ee227d381a2fd22e4841426c1f1f1ec004800df6e412df67a82abbf57d847fcbe50dd0e61b396973a7be23189c4a6a9bca19a80f9270ac7f8ae99d0128ef1a5eac3cd8e6c8cb8840890a763c99585c74de61c7b56a2c01da463c5e7345fb4b13d1b3a12d585db663d066a286d09ee12a617f910d56039d4f5346bbc655f3836d36710943c88502d8e1a291e367949a17fc36c45eda9fbb62b7787938631d5aa2cbf6a24ca0ce0832a882070c6f1b73dc682e5b60940768469e53044dd110fc76b8854e06b7763433d1cac621e6df43153dc524a50719d2b72f8630a278069d4d894ba39fefea81ed46eef4fdccd6f5c487bde09df7a151015f3a346b5413f14d1794ec78388aebde410486533269d7895f34d3f64156aa6d08828b128f6a79d550b2f80167435cabc1e2770c4a261712e6e41499483efa1e758efaed923241f12b5c41d8fad2e48acb4cb1a3f683b26e3e9602891046e3350f51c47b1852068a6061155eef7d74cb467a29bfbe6d6eed11ec48662563aa72584d0ca3e8b2cf7cb6938b1a5530574e3f35e15439eacfe0d37450425a8093842b5255a0f5a7581c57d99c12ab6dd541852e20234518be76027619c38e80cceeb1355b1bb6641943110ddba5527fd028dd1c5a57e4023c2063e275de98ed972ebe4d4c70bde86aa49bf34a99f767b95167b1be8e292ecf2acea7cb6af7a84a7b8ef2925a9bef4229e0c8614bb0f72e37dcc231fe3758d97510ecf0c1d79102685026069afc492eef95bfd62833165bf758d7680deecf2a06cfe15dc9a9a7f3d4a0555206b10c5c2b88a2eb5ae7d35a0779dba96049d272836c5223ab6864a62d91640988f5dd5da191bbce1cb8e3752b7751bee49b37120a0a6e57f970cfe41cf6026fa7433d3953fbe2d3639f8ed652307c66a8ed524e9a965fa21e8a01b0e137dd360a4354487c1cac5a190ee3c01d8fa28eeef8511c367d1e8e073fac481b7ee3a1651f902c8f2aa3a4722045e49d5454bb2cba988f7ac2a31a31a9efcf236f99e2af4b687073916c253d649ac579d05030b40558ff67db60512539b2c970cae1ea22ab83d19a2071f46b39ffdbf3fd95ff02760eccaa583c28f652193dcd8ae010030f33cf92fa5ef2a7370bc4d3321647ec7a405e6bb5b965dd4206cd8b7d887ae0148c1db45173804db32a9439c295531fdca6d1e3e86940e2fb39d5b941ad47fe743a208a1758ca5b365443e83117b73bf2cc66bcd665b2107263507dad02644d4e140c62bd036fbf3dcd7aa5ff6d0eb9cd5b501f370f7b1ca19aad4ce02b69f9db2e4479f6d7389df06e8c7b2ee9812c8df6c387131f366a5ff218cf6f541ea740ffdb7d98927d7e84b3788e96a7a260d38d7e3d7b7209cad5cab73ceb61f7a4df8a15460e4dbd7062003e0f5951ed1c9a1b4844e7e2af80bef71ff1cb25f0255c5d7457407773fc930ef44e9eea052f3b69fad3113a3483ec06ee8d2859b1b6678f51deb833e17a7523421be9e538f4064c533274703d8b95cf3a82217f8705d4e5e5fa5e00535c45fb58343d3c16a40fe4b6ec5c1dde77f5fea6232c55efee0f1ed0b1ac4ab4f1d92970b17c73ac7e574eaf3076071aa2ed38bc930f38b2b48420bbfb7cac8ee626ce5aa8551610531d791adb431acd196630a11bfb5173bfc62987d9c2236962f0fba22627898cb3cc4eb1b1cc1a83a101979b1edf37727609ea975443e23bef4ed41e90212d38b9de5209e6ebf08ced4d68d06e90054ee69d0ce1791f4fd5a959ac1ce8b9510ae5f62d24aba5b06b477113e275ec8f5b3071e39865f042fbbe637e15ae935a13e9777894f176ce7eb2a8db2a7232405024c067f82477b6ad54c8d0a343e1e4856b4ef60a1381d3658a6a4546b2b4cc95845c76bfe59f9aaea2265b480ad352338c5dd44cc05bb0268d0f0e6c2215275ec128e07ed75d50881777d1f1a3b82b5766fddbc928edd440070b17f6fb928c77bbb126e0aa8f69af51aeb10cefaa57252cf4e38c71b5e18ad0edf35ad830d0f724df3a2e6c4fc4678043fb6a64b04e714f65980d6f420306649bc5b5e3d36f8800edecd9c90a9675b9f54480cd359773644270a76dbaf6f2ae529e52cb92857a87cdeab5c7ea5bafc9bac80ecfdc9fbf1c42ee2c19899a6b774306f8fd13224be6133ba61a82de4e5cb6fe8e105f6dbce926346bab8426ad5bb07c4d8402b10253e852f52d84f34d0266216ac01ad5a024b23fa474968180831f7f0d8ea4d88865f5633d19613f43c88aa8549f04a1e8309fa5baa7c84f1b6c9a454c1430c3778fead12c8c37cfacb99b035d0b0d1a57992b22b3901292d4751d655e1afd6ae2bef64eb9815bcf4fb62a4e32e0e0ca817d070559551acdf54420e8342d6e315cf911d9deeb71093dcfcc452897144774060895268a892d3c5d7fe91e97b9a03d806e354ababaf7f4e08e0c76315780eddf4e9d1d50d0243962f2b2d88f06e84bf884fe6c231a48dd187dac46a7e2a3d99701e8c6f9e1b77416fa5ce30921505e8646c9c7ee3cf2fd5b72e52c2086a0d61734c5ec7234067f50f4521c6e48d1e4c6d3be89af8dc015fb30ce0c6fb13b6be0a6f239e11d10e19a6b368ffbc668bc3e3193b8c4c36b2ad92f3c68c6e0afbd7f92190fe3cacd86b4db6d1e412f5fd25a13370babe9c30d7feaaff4e06f43adef087fc3a25bb6815595c5758f4c5e3f180024462a47bfe69c45c0a83ffe83d531b501623b54c159bafb7100e7ac754fddf4c7ebf8efc86f1b9f69f3077fa2bebace5e9a3a9b97964cde38683ebf72089de6876d84db1244b32e718dd7c310063a5c385e388efafe00f7850708bece3b9f052f48acb98076e714fea182e72b1440dc116f2205a519ca0cd7857778d9c8b8d22f5415bd4838b81164c09358929fc41e543909f14257992028c9008f0fa1c3040e8ef609aac07495751f5205bc3526377a2c43a57f6e6899829a9ff52bc239cb5bb9233cccd99c6279066c9a8585fe2d5dac415f2ee26ee028397ce92b95d1ba393492c118293cb36a7e7eafeb48f98e7fe390d2971fbefb3833f79271979541fdac4796a8b8e877ff868f64ec82f157a599dcacc843061c524f4d1886e8ca95f21ac37a9789e4635011048895a5ef83ae6eb3480b350961ec7d23cbf732a98cfaead2094850314f3b447559170b34bf9a187f16af8762198c8b8a41a5cffc8815b9ba07deb1294e2a65e7d33f4c43a55f846379afc497d0482c10b44325261abbfce02b4275e60f356e99beecdfd04ef9b9dd42faa5b7a22ffb7a3395130efa680ef301e622e6a5965921807deef061215e5f1b420db3276d05263a51b4ba24a39e468c8398eb15e02a7d42cec3c32191559adab1e2d4f8468327bcf90ccbc8f44be8345c8955530d49c01cbf43ca96a6ac699840681e8fd0d8c64f93b11cb7172e7050e8924f8d08a7e532fd513e887bdfc9587743241f06fa4cf8202bb38410695c48d6a2724385192ffdd6057ae4a4d5e491004c6552829140645aefb9278f5a5877568a1fb955cdec6779e63a284f9d46888b9ee6f7c5ca90d3982f0c5905c55f3ffd4ccd23c2cc8a0e16d684feeb500e7b6198ac9b4f11125d221d400a9057742ce8ca6400c350acb273fdf384b5f59778c18f531f77732e0bc789c658bb7d94f087aed4292f07bf8a3acf6f4658a19dee00e61a6bac9e17f0bc1df41faace18df912a21b1c8f0ec514f9291cb94c6a3eba64da5c39a57a2560a8695f376a713e3126af339b9d9dbba5cbd2a2001fe3d2b8cf5aa7e1d0ed9cfbd8347d8259db51359b5fe93af22de8385b9e897e35bd4f0bf502cd228a79c10f5361d9a419e1c963213a69d257395d27d1e58103052c88b2b44829b7d01025a92a8c0b3193697fcbb3d00cfd000402bad547e390a1f2cef96148658ec4c5f5dff0f2838d49733ef417315e57e552e7d568a87b1f2e271288204691f7210e511f6e16b7718afcaa60546fcfdac549aa70312a0ef7943a07f61f22b507de61ca4e41c89ee6f87fee0c9f3df8e63edcc4517fb4960713b944477e9c761b5ba4864593658840012a87ba02a3544d19472563c00c253a30d47c7a328fa6aded9a42f7676ad4cc874f1e6608c5cda3233158f36dbd58eac54e90d88ca0c2335330d70cd6ab8932ef5ff244e729a40d73e8e57beade5693684b8f8200cdc6b98d55d2f3740de8c362ae85789ab650cfda5ea6bd4b958aeefdc79cd78060cec214d2f8ede49e64d5c19872515819890e53d1ec19e5d3f675f82cfd765d9ccd0a79650d3ddca0b96677b701482e6a28effd17f5daf3d97a4179ef0ab3365921ce0cb4d4fa9090e971b4f2b47caf547ee39a10dbc1671c60f4dfc40cbf26a987e8eedb9f597bd393049d2baf60980ab811d6a4e958b1f45d98bb60f8a7eafeba459f4c1657524554f25d17a9190440d8a2e3fc95f3bde3443d50e8e0a134cc58456e3f194747d0b52ab173930910728bebb8a8c172d6afb624160edb375b4acd44d603fdc19fc34910c414471bb5df33c2bf4be47403cb11034cbe4ff0b68dd47dfef2e4b74b2cd8f374e634a2342bea55c8527acc2c90c7252d9168fa42e6e0063a0fcf5f16aacce5502bf8c376c3fc6c6fc078c4c0969e84b9a44131abfffb59ebe0ddc45e53564041595288c636d7bf28619d58dc662eff13c6c2f64aeb9ca369ce27493ccd7d842333422bfd903b88f769dcb6d021a3feae4da578c4d90c4ef3bfca064d625df46e4f9fb09f339687ecf19664915f6434f75c1510b90d898ce7dc84da4b4571971bfa650fd949469f9887117effcd6473197f9fc95f9647f9a1350bf40a6564df2a0b593500f4972d9f08bf5a6146c85964b969b22bd58a6a5d82f7134b7596aea4040b6a755430fc11aa657d8625da5cca086bc5b83bea8f67358187e98c1b123dd46842940adafdb51466b4c3706709d7e1607721ead9c7e00b49e227015d4e744c0771c0108a133792f33d1c6f959223f104856449074f9d36dd5f7059d98de4bbe9385b500d7f42d15cb8a2a4e6ce8bd0eb63469cf055150b651156c52981ada94f6dbcabab6702107b72dec7bc7b5bc00ad"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000003800)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000001800)={0xfff, [{}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "ce15e5f775e532"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000002800)={r5, r9, "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", "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"}) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x80, 0x0, 0x1cc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r10 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x512001, 0x0) fallocate(r10, 0xc, 0x1ff, 0x2) r11 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r11, r1, 0x0, 0xffffff04) 12:40:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x48, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 504.683137][T20806] loop2: detected capacity change from 0 to 4 [ 504.716554][T20811] loop1: detected capacity change from 0 to 1054 [ 504.726276][T20811] EXT4-fs (loop1): inodes count not valid: 33554464 vs 32 12:40:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c401500ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000201002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 504.747625][T20815] loop3: detected capacity change from 0 to 4 [ 504.754874][T20815] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 504.788066][T20817] loop1: detected capacity change from 0 to 1054 [ 504.795085][T20817] EXT4-fs (loop1): bad geometry: block count 528 exceeds size of device (527 blocks) [ 504.823742][T20815] loop3: detected capacity change from 0 to 4 [ 504.823994][T20820] loop2: detected capacity change from 0 to 4 12:40:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 504.838344][T20815] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 504.847950][T20820] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.875152][T20822] loop1: detected capacity change from 0 to 1054 12:40:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4a, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 504.882528][T20822] EXT4-fs (loop1): bad geometry: block count 529 exceeds size of device (527 blocks) [ 504.895936][T20820] loop2: detected capacity change from 0 to 4 [ 504.902461][T20820] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 504.941825][T20824] loop3: detected capacity change from 0 to 4 [ 504.949080][T20824] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 505.007584][T20824] loop3: detected capacity change from 0 to 4 [ 505.015058][T20824] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r2, r3, &(0x7f0000000180)=0x2, 0x83a) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c002000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x4c, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 505.468551][T20826] loop2: detected capacity change from 0 to 4 [ 505.475496][T20826] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 505.501626][T20829] loop3: detected capacity change from 0 to 4 [ 505.509193][T20826] loop2: detected capacity change from 0 to 4 12:40:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c102000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 505.515619][T20826] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 505.523682][T20829] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 505.533645][T20830] loop1: detected capacity change from 0 to 1054 [ 505.542720][T20830] EXT4-fs (loop1): bad geometry: block count 530 exceeds size of device (527 blocks) [ 505.583510][T20838] loop2: detected capacity change from 0 to 4 [ 505.590700][T20838] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 505.602640][T20829] loop3: detected capacity change from 0 to 4 [ 505.611035][T20829] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 505.622660][T20838] loop2: detected capacity change from 0 to 4 12:40:07 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000001f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c002200ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 505.629413][T20838] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:07 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x53, 0x0, 0x0, 0x3, 0x2000, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x52, 0x2, @perf_config_ext={0x7f, 0x9}, 0x800, 0x7, 0x2000, 0x6, 0x80000000, 0x7, 0x7, 0x0, 0xfffffff9, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup(r2) lseek(r3, 0x101, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0x0, 0x1a, 0x0, 0x8, 0x1040, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3f21, 0x7962}, 0x4208, 0x5, 0x0, 0x2, 0x4, 0xab, 0x12, 0x0, 0x38ea, 0x0, 0x6}, 0x0, 0x10, r3, 0xa) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x60, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 505.671975][T20843] loop1: detected capacity change from 0 to 1054 [ 505.708288][T20846] loop2: detected capacity change from 0 to 4 [ 505.716470][T20843] EXT4-fs (loop1): bad geometry: block count 543 exceeds size of device (527 blocks) [ 505.727071][T20846] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 505.746055][T20849] loop3: detected capacity change from 0 to 4 [ 505.757328][T20846] loop2: detected capacity change from 0 to 4 [ 505.763853][T20846] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:07 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c002500ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 505.773032][T20849] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 505.794474][T20851] loop1: detected capacity change from 0 to 1054 [ 505.802476][T20851] EXT4-fs (loop1): bad geometry: block count 544 exceeds size of device (527 blocks) [ 505.816933][T20849] loop3: detected capacity change from 0 to 4 [ 505.823393][T20849] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 505.907398][T20854] loop2: detected capacity change from 0 to 4 [ 505.914297][T20854] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 505.956603][T20854] loop2: detected capacity change from 0 to 4 12:40:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x107fffffff, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r1, r0, &(0x7f0000000000), 0xffffffff) 12:40:07 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000102002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x68, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c002800ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r4 = accept4$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x10, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000003a00)={0x0, 0x0, "a0ec3c0a4c1c19d8f570a2c1a80667e4eafe1672d53ea855296a0218f9c9b62bbfd3eb026a212e2007b07947876560cbb5d5b9fbf9401ff09d5546116d29ead9453072f2018b325ba1d5da594d543de3cb99ff78ad184565c495e22a3945d39184c10dc8bea90e4519d9ac9677ff685c46500251a96be0f05b0375432dd90539ac950dd7527050701f5b746dbb80ba759185a28546b179083b7b9ad93949d0234b59b690ad78f4705f4acb5a394c5055a992931aff06c86123c1b402e63bc97a96f68790922830eb4074de4bc1c706f55bc354e0e9c6b0297d17adcfc7ba05dcb9ad2eec82b3963a1247ca6b33ec604b2872a2fe1b94c4f70a4dbbf47da60062", "8b320c8847da53b0f0e29b987295dc5d653ddf3917b70d825371b30e1240c3813fdc654d4c9235852276a7aa0db5a01c60ab232041dffee67e8dd914aaf5fdcf35a5ad49f2ebc8c0977d075397302c24ed2aef90913620f98b7c82aa9b018a6186b68575515f9f7faf82385d86b6c88c811e80c757b860faa1aca4659e226c341b40a46a12008de5db63f7cacb03c683c2d45bd45f59787c71e40214a916c4180b60a1543cd4054ceacfe682dc40c08cfa90aad1a740af77f594708fa4c2351475bc06454e8b1b0d5a661b665b4040417b27c76a8f69d4490698bcd751e7d9ee227d381a2fd22e4841426c1f1f1ec004800df6e412df67a82abbf57d847fcbe50dd0e61b396973a7be23189c4a6a9bca19a80f9270ac7f8ae99d0128ef1a5eac3cd8e6c8cb8840890a763c99585c74de61c7b56a2c01da463c5e7345fb4b13d1b3a12d585db663d066a286d09ee12a617f910d56039d4f5346bbc655f3836d36710943c88502d8e1a291e367949a17fc36c45eda9fbb62b7787938631d5aa2cbf6a24ca0ce0832a882070c6f1b73dc682e5b60940768469e53044dd110fc76b8854e06b7763433d1cac621e6df43153dc524a50719d2b72f8630a278069d4d894ba39fefea81ed46eef4fdccd6f5c487bde09df7a151015f3a346b5413f14d1794ec78388aebde410486533269d7895f34d3f64156aa6d08828b128f6a79d550b2f80167435cabc1e2770c4a261712e6e41499483efa1e758efaed923241f12b5c41d8fad2e48acb4cb1a3f683b26e3e9602891046e3350f51c47b1852068a6061155eef7d74cb467a29bfbe6d6eed11ec48662563aa72584d0ca3e8b2cf7cb6938b1a5530574e3f35e15439eacfe0d37450425a8093842b5255a0f5a7581c57d99c12ab6dd541852e20234518be76027619c38e80cceeb1355b1bb6641943110ddba5527fd028dd1c5a57e4023c2063e275de98ed972ebe4d4c70bde86aa49bf34a99f767b95167b1be8e292ecf2acea7cb6af7a84a7b8ef2925a9bef4229e0c8614bb0f72e37dcc231fe3758d97510ecf0c1d79102685026069afc492eef95bfd62833165bf758d7680deecf2a06cfe15dc9a9a7f3d4a0555206b10c5c2b88a2eb5ae7d35a0779dba96049d272836c5223ab6864a62d91640988f5dd5da191bbce1cb8e3752b7751bee49b37120a0a6e57f970cfe41cf6026fa7433d3953fbe2d3639f8ed652307c66a8ed524e9a965fa21e8a01b0e137dd360a4354487c1cac5a190ee3c01d8fa28eeef8511c367d1e8e073fac481b7ee3a1651f902c8f2aa3a4722045e49d5454bb2cba988f7ac2a31a31a9efcf236f99e2af4b687073916c253d649ac579d05030b40558ff67db60512539b2c970cae1ea22ab83d19a2071f46b39ffdbf3fd95ff02760eccaa583c28f652193dcd8ae010030f33cf92fa5ef2a7370bc4d3321647ec7a405e6bb5b965dd4206cd8b7d887ae0148c1db45173804db32a9439c295531fdca6d1e3e86940e2fb39d5b941ad47fe743a208a1758ca5b365443e83117b73bf2cc66bcd665b2107263507dad02644d4e140c62bd036fbf3dcd7aa5ff6d0eb9cd5b501f370f7b1ca19aad4ce02b69f9db2e4479f6d7389df06e8c7b2ee9812c8df6c387131f366a5ff218cf6f541ea740ffdb7d98927d7e84b3788e96a7a260d38d7e3d7b7209cad5cab73ceb61f7a4df8a15460e4dbd7062003e0f5951ed1c9a1b4844e7e2af80bef71ff1cb25f0255c5d7457407773fc930ef44e9eea052f3b69fad3113a3483ec06ee8d2859b1b6678f51deb833e17a7523421be9e538f4064c533274703d8b95cf3a82217f8705d4e5e5fa5e00535c45fb58343d3c16a40fe4b6ec5c1dde77f5fea6232c55efee0f1ed0b1ac4ab4f1d92970b17c73ac7e574eaf3076071aa2ed38bc930f38b2b48420bbfb7cac8ee626ce5aa8551610531d791adb431acd196630a11bfb5173bfc62987d9c2236962f0fba22627898cb3cc4eb1b1cc1a83a101979b1edf37727609ea975443e23bef4ed41e90212d38b9de5209e6ebf08ced4d68d06e90054ee69d0ce1791f4fd5a959ac1ce8b9510ae5f62d24aba5b06b477113e275ec8f5b3071e39865f042fbbe637e15ae935a13e9777894f176ce7eb2a8db2a7232405024c067f82477b6ad54c8d0a343e1e4856b4ef60a1381d3658a6a4546b2b4cc95845c76bfe59f9aaea2265b480ad352338c5dd44cc05bb0268d0f0e6c2215275ec128e07ed75d50881777d1f1a3b82b5766fddbc928edd440070b17f6fb928c77bbb126e0aa8f69af51aeb10cefaa57252cf4e38c71b5e18ad0edf35ad830d0f724df3a2e6c4fc4678043fb6a64b04e714f65980d6f420306649bc5b5e3d36f8800edecd9c90a9675b9f54480cd359773644270a76dbaf6f2ae529e52cb92857a87cdeab5c7ea5bafc9bac80ecfdc9fbf1c42ee2c19899a6b774306f8fd13224be6133ba61a82de4e5cb6fe8e105f6dbce926346bab8426ad5bb07c4d8402b10253e852f52d84f34d0266216ac01ad5a024b23fa474968180831f7f0d8ea4d88865f5633d19613f43c88aa8549f04a1e8309fa5baa7c84f1b6c9a454c1430c3778fead12c8c37cfacb99b035d0b0d1a57992b22b3901292d4751d655e1afd6ae2bef64eb9815bcf4fb62a4e32e0e0ca817d070559551acdf54420e8342d6e315cf911d9deeb71093dcfcc452897144774060895268a892d3c5d7fe91e97b9a03d806e354ababaf7f4e08e0c76315780eddf4e9d1d50d0243962f2b2d88f06e84bf884fe6c231a48dd187dac46a7e2a3d99701e8c6f9e1b77416fa5ce30921505e8646c9c7ee3cf2fd5b72e52c2086a0d61734c5ec7234067f50f4521c6e48d1e4c6d3be89af8dc015fb30ce0c6fb13b6be0a6f239e11d10e19a6b368ffbc668bc3e3193b8c4c36b2ad92f3c68c6e0afbd7f92190fe3cacd86b4db6d1e412f5fd25a13370babe9c30d7feaaff4e06f43adef087fc3a25bb6815595c5758f4c5e3f180024462a47bfe69c45c0a83ffe83d531b501623b54c159bafb7100e7ac754fddf4c7ebf8efc86f1b9f69f3077fa2bebace5e9a3a9b97964cde38683ebf72089de6876d84db1244b32e718dd7c310063a5c385e388efafe00f7850708bece3b9f052f48acb98076e714fea182e72b1440dc116f2205a519ca0cd7857778d9c8b8d22f5415bd4838b81164c09358929fc41e543909f14257992028c9008f0fa1c3040e8ef609aac07495751f5205bc3526377a2c43a57f6e6899829a9ff52bc239cb5bb9233cccd99c6279066c9a8585fe2d5dac415f2ee26ee028397ce92b95d1ba393492c118293cb36a7e7eafeb48f98e7fe390d2971fbefb3833f79271979541fdac4796a8b8e877ff868f64ec82f157a599dcacc843061c524f4d1886e8ca95f21ac37a9789e4635011048895a5ef83ae6eb3480b350961ec7d23cbf732a98cfaead2094850314f3b447559170b34bf9a187f16af8762198c8b8a41a5cffc8815b9ba07deb1294e2a65e7d33f4c43a55f846379afc497d0482c10b44325261abbfce02b4275e60f356e99beecdfd04ef9b9dd42faa5b7a22ffb7a3395130efa680ef301e622e6a5965921807deef061215e5f1b420db3276d05263a51b4ba24a39e468c8398eb15e02a7d42cec3c32191559adab1e2d4f8468327bcf90ccbc8f44be8345c8955530d49c01cbf43ca96a6ac699840681e8fd0d8c64f93b11cb7172e7050e8924f8d08a7e532fd513e887bdfc9587743241f06fa4cf8202bb38410695c48d6a2724385192ffdd6057ae4a4d5e491004c6552829140645aefb9278f5a5877568a1fb955cdec6779e63a284f9d46888b9ee6f7c5ca90d3982f0c5905c55f3ffd4ccd23c2cc8a0e16d684feeb500e7b6198ac9b4f11125d221d400a9057742ce8ca6400c350acb273fdf384b5f59778c18f531f77732e0bc789c658bb7d94f087aed4292f07bf8a3acf6f4658a19dee00e61a6bac9e17f0bc1df41faace18df912a21b1c8f0ec514f9291cb94c6a3eba64da5c39a57a2560a8695f376a713e3126af339b9d9dbba5cbd2a2001fe3d2b8cf5aa7e1d0ed9cfbd8347d8259db51359b5fe93af22de8385b9e897e35bd4f0bf502cd228a79c10f5361d9a419e1c963213a69d257395d27d1e58103052c88b2b44829b7d01025a92a8c0b3193697fcbb3d00cfd000402bad547e390a1f2cef96148658ec4c5f5dff0f2838d49733ef417315e57e552e7d568a87b1f2e271288204691f7210e511f6e16b7718afcaa60546fcfdac549aa70312a0ef7943a07f61f22b507de61ca4e41c89ee6f87fee0c9f3df8e63edcc4517fb4960713b944477e9c761b5ba4864593658840012a87ba02a3544d19472563c00c253a30d47c7a328fa6aded9a42f7676ad4cc874f1e6608c5cda3233158f36dbd58eac54e90d88ca0c2335330d70cd6ab8932ef5ff244e729a40d73e8e57beade5693684b8f8200cdc6b98d55d2f3740de8c362ae85789ab650cfda5ea6bd4b958aeefdc79cd78060cec214d2f8ede49e64d5c19872515819890e53d1ec19e5d3f675f82cfd765d9ccd0a79650d3ddca0b96677b701482e6a28effd17f5daf3d97a4179ef0ab3365921ce0cb4d4fa9090e971b4f2b47caf547ee39a10dbc1671c60f4dfc40cbf26a987e8eedb9f597bd393049d2baf60980ab811d6a4e958b1f45d98bb60f8a7eafeba459f4c1657524554f25d17a9190440d8a2e3fc95f3bde3443d50e8e0a134cc58456e3f194747d0b52ab173930910728bebb8a8c172d6afb624160edb375b4acd44d603fdc19fc34910c414471bb5df33c2bf4be47403cb11034cbe4ff0b68dd47dfef2e4b74b2cd8f374e634a2342bea55c8527acc2c90c7252d9168fa42e6e0063a0fcf5f16aacce5502bf8c376c3fc6c6fc078c4c0969e84b9a44131abfffb59ebe0ddc45e53564041595288c636d7bf28619d58dc662eff13c6c2f64aeb9ca369ce27493ccd7d842333422bfd903b88f769dcb6d021a3feae4da578c4d90c4ef3bfca064d625df46e4f9fb09f339687ecf19664915f6434f75c1510b90d898ce7dc84da4b4571971bfa650fd949469f9887117effcd6473197f9fc95f9647f9a1350bf40a6564df2a0b593500f4972d9f08bf5a6146c85964b969b22bd58a6a5d82f7134b7596aea4040b6a755430fc11aa657d8625da5cca086bc5b83bea8f67358187e98c1b123dd46842940adafdb51466b4c3706709d7e1607721ead9c7e00b49e227015d4e744c0771c0108a133792f33d1c6f959223f104856449074f9d36dd5f7059d98de4bbe9385b500d7f42d15cb8a2a4e6ce8bd0eb63469cf055150b651156c52981ada94f6dbcabab6702107b72dec7bc7b5bc00ad"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000003800)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000001800)={0xfff, [{}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "ce15e5f775e532"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000002800)={r5, r9, "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", "79aa891b6ff3b6c21aee63a424d56fa557ae5533f098a9d2ebf6a54f51bce51582786309369e1c33adb9fc3825e3710ec097ade97aedda42e483c548c5eeecef2c6087f5235eb9e3d0311b648f9de7d522d6d24dc1d8733445a4b3d3e8ae45e215e097e69eb09f8ec6504393a51debe0c57e31d7a9e243a501d9fd148ddfa611df707e5ea4dc9e22b7f57a03f9d893c88617eb944d380ee89cd7a5c2df004193501170a7ec951a5b18587968e071f873646b353f00e540559007a19c25b6384e13ca102971034fc8315fb505d73a2d3303aec0fee6df03da0836dc2bc0529a7e3675b8c2cbea8e05bb74cf35ff2ea07d946b7e8358eb026e37837b77b007d8fdb22aa26ee9914224c9a3eba7aee994b465648946efe86c0fdd32494aee31c8325e6519f60c79b71899cbe31ae5ce14055a2604a2ea5b21f7462c86032b5f3ec08f0fc5996ee343bfcdf73f9e8dac068b59fa756ced9944eb2b676d8b2fa40c04318d412d95a59781fbb1cb4d6611aca08e166c2b3c4b6f90c653e9d052aba05120fd1f7f1b56a835e8040bed9586a4fc5342f7a6f4a44de4e565716644ba3913025ce63ff53857d87fa8b6c0751403e815533eb7a804504d3a3b9f7c0a96d3ef6f4c69756eea43eb6a65b60f45c51a7cfd831d71b303f225a09a3f600380ac71f2d2d0f27fc2249d6abd6b5891b31273ea5e6136dc47e13ad6ff41c8c90641aa9acc3f889854b1be3d51b7a8846b84ec4537eb250496025c0aeda7924604cbb3fb19380ad8aef5af281af17e54572d7f8f4587951117324c81e8b0655062e88f02a74970756df6b313e4f3b7ac837bf7c51b6178baa312c91533c595827c1b8035e215e560a35c5fda8f0b92609e4a64b386c031c63f788378a1011c094b272f19f11fa2ca587f1c49c28b0eb4c3ba60e8cee6996cf5988cb8ad4dd0dc8175d05dda381b04ad871d1501ca00042c8f5ce9d4aaa718686c9d7d337c9e6ebbf719c9ac39dd684792179d7dcf449af576996ea1231357b28f45c4677943eeebd6f9ec7be1c14d5126a91a1b9d393896493389de661d2b8daac17510804b58d34763855a064dcbf6a2f9924f672139c17aa616d00b406dd9aa41c6dfeedd5ebcb997b656615d29545f33bbbff27ecc7337ce62bb181fe9db89fde50445b2d1eed563f448085280a01dedc0511db093f1df7cfb812aa25c77dc2e378f5ba4bf85812e2167894b09fcc7dc6d01db747f173180e5be2905ceccb3399123d9fac329d1a8c9cd7dcdab7e57114e5bbbe7eb1d5181561e930afdec50c549cfc6b76ef2844a6fad68557dafb46683f84bda7ce30dcecbd24725b54999b385838cfaa51031c0e92b023f4db0ea674e4880e3b01b5c853035d87629d7d7596a874d21ef3a4796978d203f6900e7774ad0550fca92e72a3ce421d6659b360b0f8c82e2f371aa4c906f1d5b5682662a6a2bd0f55f5cbc5cb6c312ae521c44dd3531cc72b80db1e9f27f46792bb1c414a67cee34a27939b61bd4c714611b7900cefb1ff5ff79e42aa133ae97e20e79f4bb515dd766e461c0c2557ee49962daf3ed0119e6b7d59c7a483a0ac3f60d361a80ef37e00f4371c7650d8c8de20b58d2c9149321784aca2c9a1ec902b4c47cdc5383a22d51f1a861ed51638fe5ddcad9faffc00c49d4ad54289f8f0878f49f63aa3d87723be9ea4965d12522f88f79ca9a488ece57976442b1e0b8a8c911a874429015ec98ef75e447a95dc87ec633620950658a2fd74a757750d8a2cea9f4211bf69601e5aa9b2f657e268d34028c9f2597a132913f63440474002684edb94c0dd98c860e82cd94203a1636c4c220e35de7ca3fb156768609f0a17af6e533e15a047666682ea61f8b16929e2bbaf6897c20c0dc1f79722632fd96156687c4941c6c34588c49ac6e080751da258dcfef043b9cb6aaad47e71bc8a34adb3c5b6d43552353a8317bb24a547b789ca04ffcf96ecc969dc9db281dc76bb6e2413f1491bc926095af192de8b23db2de3dc161e19936731c27559ca9f5a3e42f03cb8b2a18af53fe2950a8d55341eb805422d7f205e147f7bd180cb1ef1d2f1fc06be6cc76bc0de588184901dae687757c4b3a971c8bd9156a983eb2c5770847d6d882bec43751a78058a1940a5bd68f1e6f3ef0e2ad04f46af40bdccdd3a43de9680f9871721d159e0e2e174c99b56f1ea13ecf99d432973f43b6bf227a64e6ae2a6f2cdeca7a5a0ddca6bbe166cb52ce3e9d69a82666a1afc53eadac55fc9e13324059d22f8a6e07a3af0b53d3fcb09d93d4209e4e27c936953ddd2663a75d8cb8391bd531fb12670afeaa2d77f6661f19919f10c8db605a1b6d3291cea62960b5f678e7a26f10d67ff7fce5dcccd15b420d0fb1b192d979daba60974a1fc057317db23e709c577ee717f227da3d4609f6b98c44fe66289aa499e2e01638f9b66fa2c62ae6f18a69847d1a3d7d003b789335fa60973457afb5b267cadd9a4bf1589fbd3a4adccabecb868f15545ce612afd2817ed1812555d481412313d3ca2e82197b7855e9eddeb45add02f0cc33b6b40357263fc9b57ae1bf0fd0f462c71792e4cfe5866d220c248b601cebf92a191133bf9168f952a58353f69484357447ef5a93ffaa0c103cde2abcd4398afe2ab357d8fa04c0c9d24ca8230c7958ea69eaa0aead255caa97cab577f45c28697d6f1520e514e35289ed13ee4ca86ddb990174951577300a077aa684c52ffa6020e9321638c3c2e883fdb1f492fa425396f05e7943093edb86e8e2c1b17170ad904735b94ff41b499f6502e09671b67aa2773a0eb097a797a44deeee5e58b3d949b2681193c183ba6691a14585f45f427a8c24f18dc12de470dc9d65a57dbbd80d533938f3ae6604205a747b33fa835fb29ddaea30d2d0ab76fdaad5820f9328ed06751f5cbf4da605ea6549fa310f8d9f9d817914332452cec4e29af55869df12512a005abe9cd7ba4bd750d72532cf029bcff8f7e2107aaa47175e516a1353e485e03c41039f760547bbf890787774663a4bc94a181a5fd70063f4bdc1e9768ba8ba3a82e0bd9ced4e8ad8f25842d793ed9bf4ea606ff12f2fa9f55518fb3b19366a1dbc7b18e0cf452752dac1cd0d9361430446c232c98c320805c88fabe0e76a11fdc76ad37470c3c5082559cffc65c9620beb4a0782549d1030578cd8d69433164ad68cf701b212807fbc0481138e3f2a4fb402d15a3a5d8e862151c5bb84879bd5a31f9aa7be2a3d34b0c53e13098b0678a99006e4eb384d9c5671408d566b291fe997fb6b4f10e08aebbb084a978fcd9f054e4ab62a8304a3c6fa6c8820d597e111498ad407812bad778fa35a38b20f644a37895aa240dbeda5340b457fd51d4eca7908654f2c883a72253442d6fd0158922af17d2b5f25bde85cab2e286992710813ce9440960f34e91f8901086f779fc0ef02c9c179afa6c4eb835ce8c7ac2d5ce4b2157483263d798a8c432b74ca6ac7c88c54bffa01fb8c64bff8c0eb393d09068c04153455147f207915ca8718bf2224146b3f263bba644dc24d6c7be9481fce9d9070678c5cd8c56871d808c92cc20796fe7b599645afb765a1fdc056631276eb5457ec52218164a55cace300dfdfe1fb218fa1ecefa62072ce5a3f45556dc5d9a54aee18e40e0dece205917adab6912f9fb83efe3ee29f9452fcffa161618908b048ccc98a97263de61545c625a23e2dfbb1a4e7d12a3267b1ae71eb0312b03ba9b517bc0fe72994bde25abf4e219a247f62f9010b49064d22484b1c5d17dfd0f76890a920eef8ea4bcbaae3a6a42c659c592331058c52ff9c53326fd15d5cc6bc1598ca86ccf7bb85f8b8bfa4106c5f5d5c8ce278a78cde71c80bb00b6d673f929c7af2917403d826320bb4835523666405792813d6689604bd84c19b9fdfc002b9c9fe2d13a724563a086fd4a88ec0cdc0195ce274d40082a8432585a8dae76644a3ab70077dc5f80340c59c26443f778660f11ab02d448dc7bde0c849b3566be454a91148761dd798bd4a30a075482d425a1e7070e6e480161cdc5166ae93e1b138bebb4264b32391274e556332e3420dd653eadc5de1c16eb01b6a453de5ec25eed997966846713cb4ea9493189527e203b4138027b7eb290c79a9e51d05738f4284edc65250e5b216ea22ac6196fb7b6d34701b5b800b20638cf4ef2f006d1e84d0a89530ad374e6296ba08e7b769fcf0856fbbd73c3a5a1507891d18d1ae8ae4c7549ddccfb46ec96343355ee46af1c137daee1f320190c47dbd9723b8a6fb15ad113360699f733424828aa1a9827b6970c21896030d1de635cbb95ba33550e757d66c01172cf673aded4e352fa661459f37d5c77585e43c7ecea3b34954abdc75713b29420f14e07c03ec5e1e9591200f0d5e0ac3895282056aff3d06b895cfb7f735d958bc88df489e58fdad0f3a487e6d73a705b1e4e78b61cb4f873a2f5ff7d54f81b98da46f90fa4b405f748d11dd80b80937a1b18109575a6dbedf15fae7c3206c0abc7ca4e62f3a14bcbeb18e81668c5ba44de453774cabb412dec744f7cb9658429550e7882e321d2ab1110556fadbfce15ba83965a96b44916c81b9006c9950951e951a642924419734a88bef115bebff17008b277b2205564dfb9be126d3d86bfdab736b21e9fcc011ca2c1a3a6432fcbcd1e30682df515ebf1a46f03cb9d31cfbc5dd8b463718b900c1325ffe634b72e037a77e1b548dc7cb2153d7133badeda79199c0d3f209174eced4ef4bd9d22e0094d67b1ce2ad61d85e904d22b48361fd92c256aef9bf0ac6d1f2b12ccb365b01ffae65f0784064f1b2e6b885ea38a009f1a984b1a60bc60e9b207aa802940f804b8537daaea2ab44c9362325f6d5e1cf5efbb2a9cca29b013a336b58aa04ed20d858f54ddecef66ef76f49c3ca407e367433a9db7e8ef720b41b2fd4297719b0466b52ce6c170a50a0eb9ced63226e1e0f93cef9c2016b737036cc8193503bbf2a0ec4494629b527772c79b663acd0b12debadd3ddb901d1bb2f0bfc8254e48c6037675b51ea6ade969ad5af6a12694b1f689e0f6997ba5bb09fb5ab13f50e7711cd66a85f09c743e48887fddb3200e1aa9beab47a39f8b98d592ec6336daf7e6c0f5657f7aab012637be623ac4371a235b85905be8c2fdd41ce5366b9b8907ee4c88d100a9cf45bad29c91e2ee3625174ac9cb425a7e7c537511e8d4c5fbd85456f782764ef6072ea1092b5d145a32360c8882438cd373d64d8448230b95f34516366b1e7d25a30d0f12ba03102c0750020f74e4b8bdd31b675ddbc6bd0f1621eff95742a05c9267facf07e56e205be1fd6669e0ecb8b97627d6b54f69ac31fa018ea286780e1806e57f9eced9e0cb863113eff5e03e866b5f892"}) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x80, 0x0, 0x1cc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r10 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x512001, 0x0) fallocate(r10, 0xc, 0x1ff, 0x2) r11 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r11, r1, 0x0, 0xffffff04) [ 506.466066][T20856] loop3: detected capacity change from 0 to 4 [ 506.477567][T20859] loop1: detected capacity change from 0 to 1054 [ 506.478162][T20861] loop2: detected capacity change from 0 to 4 [ 506.490905][T20861] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 506.494427][T20859] EXT4-fs (loop1): bad geometry: block count 544 exceeds size of device (527 blocks) 12:40:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x107fffffff, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r1, r0, &(0x7f0000000000), 0xffffffff) [ 506.500355][T20856] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 506.527400][T20861] loop2: detected capacity change from 0 to 4 [ 506.535941][T20861] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 506.549130][T20864] EXT4-fs warning: 8 callbacks suppressed 12:40:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c002e00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 506.549157][T20864] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 506.550743][T20868] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 506.604443][T20856] loop3: detected capacity change from 0 to 4 12:40:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x8000000000000, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) rt_sigqueueinfo(r4, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, r4) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x6, 0x7f, 0x4, 0x6, 0x0, 0x100000000, 0x50808, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa6, 0x4, @perf_bp={&(0x7f0000000240), 0x5}, 0x0, 0x8001, 0x9, 0x5, 0x80000001, 0x1, 0x3f, 0x0, 0x1, 0x0, 0x4}, r4, 0x10, r0, 0x5813b8ea2c90486e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r1, 0x0, 0xffffff04) 12:40:08 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x107fffffff, 0x103382) sendfile(r0, r0, 0x0, 0x3) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r1, r0, &(0x7f0000000000), 0xffffffff) [ 506.616483][T20856] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 506.639555][T20872] loop2: detected capacity change from 0 to 4 [ 506.647342][T20872] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 506.670968][T20876] loop1: detected capacity change from 0 to 1054 [ 506.677979][T20876] EXT4-fs (loop1): bad geometry: block count 546 exceeds size of device (527 blocks) [ 506.696904][T20874] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 506.710755][T20872] loop2: detected capacity change from 0 to 4 12:40:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c003f00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 506.717411][T20872] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:08 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:08 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x53, 0x0, 0x0, 0x3, 0x2000, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x52, 0x2, @perf_config_ext={0x7f, 0x9}, 0x800, 0x7, 0x2000, 0x6, 0x80000000, 0x7, 0x7, 0x0, 0xfffffff9, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup(r2) lseek(r3, 0x101, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0x0, 0x1a, 0x0, 0x8, 0x1040, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3f21, 0x7962}, 0x4208, 0x5, 0x0, 0x2, 0x4, 0xab, 0x12, 0x0, 0x38ea, 0x0, 0x6}, 0x0, 0x10, r3, 0xa) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x6c, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 506.771248][T20880] loop2: detected capacity change from 0 to 4 [ 506.778900][T20880] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 506.793111][T20882] loop1: detected capacity change from 0 to 1054 12:40:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c004000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 506.814079][T20882] EXT4-fs (loop1): bad geometry: block count 549 exceeds size of device (527 blocks) [ 506.824139][T20886] loop3: detected capacity change from 0 to 4 [ 506.845908][T20884] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 506.868358][T20886] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 506.879230][T20890] loop2: detected capacity change from 0 to 4 [ 506.886511][T20890] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 506.906574][T20890] loop2: detected capacity change from 0 to 4 12:40:08 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002e02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 506.922166][T20886] loop3: detected capacity change from 0 to 4 [ 506.929999][T20886] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 506.944196][T20892] loop1: detected capacity change from 0 to 1054 [ 506.951529][T20892] EXT4-fs (loop1): bad geometry: block count 558 exceeds size of device (527 blocks) 12:40:08 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c154000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x74, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 507.437721][T20895] loop2: detected capacity change from 0 to 4 [ 507.444944][T20895] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 507.466345][T20895] loop2: detected capacity change from 0 to 4 [ 507.472830][T20895] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:08 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000002f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c004800ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 507.487280][T20899] loop3: detected capacity change from 0 to 4 [ 507.495290][T20887] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 507.508296][T20899] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rt_cache\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000280)={0x2, 0x80, 0x6, 0x44, 0x0, 0x27, 0x0, 0xfffffffffffffffb, 0x5024, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x28, 0x0, @perf_bp={&(0x7f0000000240)}, 0x8a, 0x6, 0x3, 0x9, 0xfff, 0x4, 0x0, 0x0, 0x3, 0x0, 0x1}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xfd, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x84011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) rt_sigqueueinfo(r3, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, r3) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000800)={0x0, 0x7c8, 0x1, [0x54c5, 0x5, 0x3, 0x5], [0x8000, 0x8, 0xa5, 0xac, 0x1e, 0x2, 0x3, 0x101, 0x4, 0x4, 0x8, 0x1f, 0x4, 0x7, 0x4, 0x1, 0x3d63, 0x2, 0x3, 0xff, 0x7, 0x7, 0x3, 0x7f, 0x6, 0x2, 0x6, 0x1, 0x8000, 0x80000001, 0x5, 0x7, 0x79, 0x6, 0x401, 0x3, 0x10001, 0x27, 0x21, 0x5, 0x0, 0x1, 0x2, 0x5, 0x5, 0x9, 0xfff, 0x5, 0x70d, 0xff, 0xd18, 0x8, 0x9bd, 0x1, 0x1, 0x8, 0x10000, 0x4, 0x6, 0x7f, 0x8000, 0x1, 0x80, 0x0, 0x6, 0x7, 0x3, 0x8, 0x2, 0xffffffffffffff29, 0x6, 0x6, 0x9, 0xc70, 0x1, 0x8, 0x0, 0x4, 0x7, 0x5, 0x0, 0x8, 0x0, 0x3, 0x7, 0x7f, 0x86e, 0xf1c, 0x1000, 0x83, 0x9, 0x6, 0xe6, 0x3, 0x2, 0x2, 0x101, 0x3993f4c2, 0x3, 0x7, 0x1, 0x3, 0x40, 0x0, 0x2, 0x2b0d, 0x1, 0x6, 0x5, 0x1f, 0x6, 0x9, 0x8, 0x16, 0x0, 0x7c, 0x0, 0xfffffffffffff001, 0x20, 0x800, 0x6]}) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x1, 0x4, 0x1, 0x0, 0x0, 0x1, 0x90c10, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7addd5b126337eec, @perf_bp={&(0x7f0000000300), 0x8}, 0x1a2, 0x1f, 0x8000, 0x6, 0x20, 0x20, 0xb1b, 0x0, 0x1ff, 0x0, 0x5}, r3, 0x8, r0, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r2, 0x0, 0xffffff04) [ 507.544558][T20903] loop1: detected capacity change from 0 to 1054 [ 507.568946][T20903] EXT4-fs (loop1): bad geometry: block count 559 exceeds size of device (527 blocks) [ 507.580616][T20899] loop3: detected capacity change from 0 to 4 [ 507.587076][T20906] loop2: detected capacity change from 0 to 4 12:40:09 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c004a00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 507.594541][T20906] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 507.610431][T20899] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 507.640731][T20911] loop1: detected capacity change from 0 to 1054 [ 507.656106][T20913] loop2: detected capacity change from 0 to 4 [ 507.663198][T20913] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 507.672603][T20914] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:40:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x7a, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000000300)='./file1\x00', r1, &(0x7f0000000340)='./file1/file0\x00') openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x200002, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x40010, r2, 0x8951000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)) 12:40:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x53, 0x0, 0x0, 0x3, 0x2000, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x52, 0x2, @perf_config_ext={0x7f, 0x9}, 0x800, 0x7, 0x2000, 0x6, 0x80000000, 0x7, 0x7, 0x0, 0xfffffff9, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) rt_sigqueueinfo(0x0, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup(r2) lseek(r3, 0x101, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x7f, 0x3, 0x0, 0x1a, 0x0, 0x8, 0x1040, 0xb, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x3f21, 0x7962}, 0x4208, 0x5, 0x0, 0x2, 0x4, 0xab, 0x12, 0x0, 0x38ea, 0x0, 0x6}, 0x0, 0x10, r3, 0xa) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) [ 507.689204][T20911] EXT4-fs (loop1): bad geometry: block count 566 exceeds size of device (527 blocks) [ 507.718815][T20913] loop2: detected capacity change from 0 to 4 [ 507.725510][T20913] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c004c00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 507.742214][T20916] loop3: detected capacity change from 0 to 4 [ 507.749652][T20916] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 507.770364][T20918] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 507.785306][T20920] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 507.790789][T20916] loop3: detected capacity change from 0 to 4 [ 507.812392][T20916] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 507.843703][T20923] loop2: detected capacity change from 0 to 4 [ 507.851130][T20923] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 507.876771][T20923] loop2: detected capacity change from 0 to 4 [ 507.883298][T20923] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:09 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003702000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xfe, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c006000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x8000000000000, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) rt_sigqueueinfo(r4, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) fcntl$setown(0xffffffffffffffff, 0x8, r4) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x6, 0x7f, 0x4, 0x6, 0x0, 0x100000000, 0x50808, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa6, 0x4, @perf_bp={&(0x7f0000000240), 0x5}, 0x0, 0x8001, 0x9, 0x5, 0x80000001, 0x1, 0x3f, 0x0, 0x1, 0x0, 0x4}, r4, 0x10, r0, 0x5813b8ea2c90486e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r1, 0x0, 0xffffff04) [ 508.422616][T20928] loop2: detected capacity change from 0 to 4 [ 508.426834][T20930] loop1: detected capacity change from 0 to 1054 [ 508.431841][T20931] loop3: detected capacity change from 0 to 4 [ 508.441782][T20928] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 508.450808][T20931] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 508.462690][T20930] EXT4-fs (loop1): bad geometry: block count 567 exceeds size of device (527 blocks) [ 508.476738][T20928] loop2: detected capacity change from 0 to 4 [ 508.477087][T20933] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 508.483848][T20928] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c006800ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:09 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 508.527121][T20931] loop3: detected capacity change from 0 to 4 [ 508.533772][T20931] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 508.570893][T20936] loop1: detected capacity change from 0 to 1054 [ 508.577761][T20936] EXT4-fs (loop1): bad geometry: block count 568 exceeds size of device (527 blocks) [ 508.602629][T20922] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:40:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x17b, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:10 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r4, r0, &(0x7f0000000180)=0x4, 0xc5) sendfile(r1, r2, 0x0, 0x7fffffff) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r1, 0x0, 0xffffff04) fcntl$getown(r3, 0x9) 12:40:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003902000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 508.617665][T20938] loop2: detected capacity change from 0 to 4 [ 508.625285][T20938] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 508.661340][T20938] loop2: detected capacity change from 0 to 4 12:40:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c006c00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 508.683546][T20942] loop3: detected capacity change from 0 to 4 [ 508.696213][T20944] loop1: detected capacity change from 0 to 1054 [ 508.702906][T20944] EXT4-fs (loop1): bad geometry: block count 569 exceeds size of device (527 blocks) [ 508.702906][T20942] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 508.746793][T20942] loop3: detected capacity change from 0 to 4 [ 508.753324][T20942] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1a1, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 508.788306][T20950] loop1: detected capacity change from 0 to 1054 [ 508.795092][T20950] EXT4-fs (loop1): bad geometry: block count 570 exceeds size of device (527 blocks) [ 508.815854][T20953] loop2: detected capacity change from 0 to 4 [ 508.822820][T20953] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003b02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 508.842371][T20956] loop3: detected capacity change from 0 to 4 [ 508.862920][T20956] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 508.872369][T20958] loop1: detected capacity change from 0 to 1054 12:40:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c007400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 508.885787][T20958] EXT4-fs (loop1): bad geometry: block count 571 exceeds size of device (527 blocks) [ 508.886101][T20953] loop2: detected capacity change from 0 to 4 [ 508.902085][T20953] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 508.948555][T20945] ================================================================== [ 508.956689][T20945] BUG: KCSAN: data-race in __blk_mq_sched_dispatch_requests / blk_mq_request_bypass_insert [ 508.966676][T20945] [ 508.968999][T20945] write to 0xffff88810254ee10 of 8 bytes by task 33 on cpu 1: [ 508.976528][T20945] blk_mq_request_bypass_insert+0x6a/0x130 [ 508.982768][T20945] blk_mq_sched_insert_request+0xfd/0x220 [ 508.988479][T20945] blk_mq_requeue_work+0x37b/0x3e0 [ 508.993579][T20945] process_one_work+0x3fc/0x980 [ 508.998430][T20945] worker_thread+0x616/0xa70 [ 509.003272][T20945] kthread+0x2c7/0x2e0 [ 509.007331][T20945] ret_from_fork+0x1f/0x30 [ 509.011737][T20945] [ 509.014044][T20945] read to 0xffff88810254ee10 of 8 bytes by task 20945 on cpu 0: [ 509.021788][T20945] __blk_mq_sched_dispatch_requests+0x80/0x270 [ 509.027948][T20945] blk_mq_sched_dispatch_requests+0x9f/0x110 [ 509.034095][T20945] __blk_mq_run_hw_queue+0xc1/0x140 [ 509.039282][T20945] __blk_mq_delay_run_hw_queue+0x199/0x360 [ 509.045076][T20945] blk_mq_run_hw_queue+0x231/0x260 [ 509.050358][T20945] blk_mq_sched_insert_requests+0x130/0x200 [ 509.056246][T20945] blk_mq_flush_plug_list+0x372/0x460 [ 509.061607][T20945] blk_flush_plug+0x252/0x2b0 [ 509.066272][T20945] blk_finish_plug+0x44/0x60 [ 509.070848][T20945] read_pages+0x34b/0x5f0 [ 509.075168][T20945] page_cache_ra_unbounded+0x3d2/0x430 [ 509.080622][T20945] ondemand_readahead+0x4f8/0x700 [ 509.085643][T20945] page_cache_sync_ra+0xaf/0xe0 [ 509.090489][T20945] filemap_read+0x3d8/0x1720 [ 509.095067][T20945] generic_file_read_iter+0x75/0x2c0 [ 509.100343][T20945] ext4_file_read_iter+0x1db/0x290 [ 509.105539][T20945] generic_file_splice_read+0x24f/0x330 [ 509.111091][T20945] splice_direct_to_actor+0x2aa/0x650 [ 509.116456][T20945] do_splice_direct+0x106/0x190 [ 509.121296][T20945] do_sendfile+0x675/0xc40 [ 509.125710][T20945] __x64_sys_sendfile64+0x102/0x140 [ 509.130912][T20945] do_syscall_64+0x44/0xa0 [ 509.135325][T20945] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 509.141300][T20945] [ 509.143609][T20945] value changed: 0xffff88810254ee08 -> 0xffff888101b9c848 [ 509.150700][T20945] [ 509.153012][T20945] Reported by Kernel Concurrency Sanitizer on: [ 509.159143][T20945] CPU: 0 PID: 20945 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 509.167634][T20945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.177689][T20945] ================================================================== [ 509.198013][T20956] loop3: detected capacity change from 0 to 4 [ 509.204615][T20956] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 509.225742][T20960] loop2: detected capacity change from 0 to 4 [ 509.232589][T20960] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:10 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200003c80002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000003f02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x204, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c007a00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 509.341141][T20964] loop1: detected capacity change from 0 to 1054 [ 509.351651][T20965] loop3: detected capacity change from 0 to 4 [ 509.358583][T20964] EXT4-fs (loop1): bad geometry: block count 575 exceeds size of device (527 blocks) [ 509.362892][T20967] loop2: detected capacity change from 0 to 4 [ 509.374897][T20965] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 509.385316][T20967] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 509.396323][T20969] loop4: detected capacity change from 0 to 1054 [ 509.407484][T20969] EXT4-fs (loop4): inodes count not valid: 3355639840 vs 32 [ 509.415551][T20967] loop2: detected capacity change from 0 to 4 [ 509.448924][T20965] loop3: detected capacity change from 0 to 4 [ 509.459756][T20965] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c017b00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000004002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 509.582578][T20973] loop1: detected capacity change from 0 to 1054 [ 509.590214][T20974] loop2: detected capacity change from 0 to 4 [ 509.600013][T20974] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 509.623448][T20973] EXT4-fs (loop1): bad geometry: block count 576 exceeds size of device (527 blocks) [ 509.636665][T20974] loop2: detected capacity change from 0 to 4 [ 509.643428][T20974] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f00000000c0)=0x1) sendfile(r4, r0, &(0x7f0000000180)=0x4, 0xc5) sendfile(r1, r2, 0x0, 0x7fffffff) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r1, 0x0, 0xffffff04) fcntl$getown(r3, 0x9) 12:40:11 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff03) 12:40:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c01a100ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000004802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 509.736710][T20980] loop2: detected capacity change from 0 to 4 [ 509.743881][T20980] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 509.752235][T20978] loop3: detected capacity change from 0 to 4 [ 509.761141][T20982] loop1: detected capacity change from 0 to 1054 [ 509.768372][T20978] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 509.779535][T20982] EXT4-fs (loop1): bad geometry: block count 584 exceeds size of device (527 blocks) [ 509.780850][T20980] loop2: detected capacity change from 0 to 4 [ 509.797163][T20980] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c03b500ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000004c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 509.874935][T20978] loop3: detected capacity change from 0 to 4 [ 509.887490][T20978] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 509.891885][T20987] loop1: detected capacity change from 0 to 1054 [ 509.912537][T20990] loop2: detected capacity change from 0 to 4 [ 509.919728][T20990] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 509.928812][T20987] EXT4-fs (loop1): bad geometry: block count 588 exceeds size of device (527 blocks) 12:40:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3b5, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000005402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c03d700ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 509.969138][T20990] loop2: detected capacity change from 0 to 4 [ 509.975625][T20990] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.024917][T20993] loop1: detected capacity change from 0 to 1054 [ 510.037561][T20993] EXT4-fs (loop1): bad geometry: block count 596 exceeds size of device (527 blocks) [ 510.037651][T20996] loop3: detected capacity change from 0 to 4 [ 510.053865][T20997] loop2: detected capacity change from 0 to 4 [ 510.061537][T20997] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.072349][T20996] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 510.102833][T20997] loop2: detected capacity change from 0 to 4 [ 510.109285][T20997] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.118497][T20996] loop3: detected capacity change from 0 to 4 12:40:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000005502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000cfffe00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 510.125249][T20996] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 510.155196][T20999] loop1: detected capacity change from 0 to 1054 [ 510.174699][T20999] EXT4-fs (loop1): bad geometry: block count 597 exceeds size of device (527 blocks) [ 510.242725][T21001] loop2: detected capacity change from 0 to 4 [ 510.250449][T21001] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.300395][T21001] loop2: detected capacity change from 0 to 4 [ 510.306973][T21001] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:12 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) (fail_nth: 1) 12:40:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3c1, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:12 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000005602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c0fff00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000148000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 510.779344][T21005] loop3: detected capacity change from 0 to 4 [ 510.797817][T21007] loop1: detected capacity change from 0 to 1054 [ 510.810545][T21011] loop4: detected capacity change from 0 to 4 [ 510.817608][T21011] EXT4-fs (loop4): Unrecognized mount option "6" or missing value 12:40:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000cfeff00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 510.819060][T21005] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 510.835311][T21009] loop2: detected capacity change from 0 to 4 [ 510.842362][T21009] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.862686][T21007] EXT4-fs (loop1): bad geometry: block count 598 exceeds size of device (527 blocks) 12:40:12 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) (fail_nth: 1) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 510.924501][T21014] loop2: detected capacity change from 0 to 4 [ 510.931727][T21014] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 510.940199][T21015] FAULT_INJECTION: forcing a failure. [ 510.940199][T21015] name failslab, interval 1, probability 0, space 0, times 0 [ 510.952838][T21015] CPU: 0 PID: 21015 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 510.961259][T21015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.971327][T21015] Call Trace: [ 510.974743][T21015] dump_stack_lvl+0xd6/0x122 [ 510.979436][T21015] dump_stack+0x11/0x1b [ 510.983709][T21015] should_fail+0x23c/0x250 [ 510.988196][T21015] ? alloc_pipe_info+0xac/0x350 [ 510.993112][T21015] __should_failslab+0x81/0x90 [ 510.997894][T21015] should_failslab+0x5/0x20 [ 511.002418][T21015] kmem_cache_alloc_trace+0x52/0x350 [ 511.007803][T21015] alloc_pipe_info+0xac/0x350 [ 511.012507][T21015] splice_direct_to_actor+0x5f7/0x650 [ 511.017919][T21015] ? security_file_permission+0x7c/0xa0 [ 511.023475][T21015] ? do_splice_direct+0x190/0x190 [ 511.028601][T21015] ? security_file_permission+0x87/0xa0 [ 511.034156][T21015] do_splice_direct+0x106/0x190 [ 511.039047][T21015] do_sendfile+0x675/0xc40 [ 511.043664][T21015] __x64_sys_sendfile64+0x102/0x140 [ 511.049314][T21015] do_syscall_64+0x44/0xa0 [ 511.053862][T21015] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.059778][T21015] RIP: 0033:0x7f3c2a8b8ae9 [ 511.064196][T21015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 511.083902][T21015] RSP: 002b:00007f3c2860e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 511.092320][T21015] RAX: ffffffffffffffda RBX: 00007f3c2a9cc020 RCX: 00007f3c2a8b8ae9 [ 511.100295][T21015] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000007 [ 511.108274][T21015] RBP: 00007f3c2860e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 511.116250][T21015] R10: 00000000ffffff04 R11: 0000000000000246 R12: 0000000000000001 [ 511.124259][T21015] R13: 00007ffd5342bdcf R14: 00007f3c2860e300 R15: 0000000000022000 [ 511.145126][T21017] FAULT_INJECTION: forcing a failure. [ 511.145126][T21017] name failslab, interval 1, probability 0, space 0, times 0 [ 511.157790][T21017] CPU: 0 PID: 21017 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 511.166383][T21017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.176440][T21017] Call Trace: [ 511.179718][T21017] dump_stack_lvl+0xd6/0x122 [ 511.184333][T21017] dump_stack+0x11/0x1b [ 511.188520][T21017] should_fail+0x23c/0x250 [ 511.189637][T21019] loop1: detected capacity change from 0 to 1054 [ 511.192949][T21017] ? getname_flags+0x84/0x3f0 [ 511.192986][T21017] __should_failslab+0x81/0x90 [ 511.193011][T21017] should_failslab+0x5/0x20 [ 511.213270][T21017] kmem_cache_alloc+0x4f/0x320 [ 511.218182][T21017] getname_flags+0x84/0x3f0 [ 511.222697][T21017] getname+0x15/0x20 [ 511.226598][T21017] do_sys_openat2+0x6d/0x2b0 [ 511.231200][T21017] __x64_sys_openat+0xef/0x110 [ 511.236131][T21017] do_syscall_64+0x44/0xa0 [ 511.240555][T21017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.246509][T21017] RIP: 0033:0x7fcb1768ca04 [ 511.250932][T21017] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 12:40:12 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000005c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 511.270608][T21017] RSP: 002b:00007fcb1544fcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 511.279029][T21017] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fcb1768ca04 [ 511.287066][T21017] RDX: 0000000000000000 RSI: 00007fcb1544fd60 RDI: 00000000ffffff9c [ 511.295051][T21017] RBP: 00007fcb1544fd60 R08: 0000000000000000 R09: 0000000000000000 [ 511.303025][T21017] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 511.311001][T21017] R13: 00007ffdcf15caaf R14: 00007fcb15450300 R15: 0000000000022000 12:40:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000200ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 511.320356][T21019] EXT4-fs (loop1): bad geometry: block count 604 exceeds size of device (527 blocks) [ 511.352556][T21005] loop3: detected capacity change from 0 to 4 [ 511.364393][T21023] loop2: detected capacity change from 0 to 4 [ 511.366082][T21005] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 511.380132][T21023] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:12 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 511.407404][T21023] loop2: detected capacity change from 0 to 4 [ 511.413953][T21023] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 511.444305][T21025] loop1: detected capacity change from 0 to 1054 12:40:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000300ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3d7, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 511.457414][T21025] EXT4-fs (loop1): bad geometry: block count 608 exceeds size of device (527 blocks) [ 511.487422][T21027] loop2: detected capacity change from 0 to 4 [ 511.494295][T21027] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 511.517678][T21029] loop3: detected capacity change from 0 to 4 [ 511.518322][T21027] loop2: detected capacity change from 0 to 4 [ 511.530916][T21027] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 511.536055][T21029] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 511.588121][T21029] loop3: detected capacity change from 0 to 4 [ 511.602452][T21029] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) (fail_nth: 2) 12:40:13 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) (fail_nth: 2) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000400ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x402, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:13 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r2) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x200, 0x0, 0x0, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x408d1}, 0x20040040) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x200, 0x70bd2c, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x830) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0x0, [], 0x0, "45146335e226df"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f0000056f00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "3440bc4565fa1b"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000057f00)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x5, "4b8d9cdf439c74"}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r0, 0x0, 0xffffff04) [ 511.740938][T21032] FAULT_INJECTION: forcing a failure. [ 511.740938][T21032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 511.754022][T21032] CPU: 1 PID: 21032 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 511.762442][T21032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.772524][T21032] Call Trace: [ 511.775801][T21032] dump_stack_lvl+0xd6/0x122 [ 511.780485][T21032] dump_stack+0x11/0x1b [ 511.784631][T21032] should_fail+0x23c/0x250 [ 511.789041][T21032] should_fail_usercopy+0x16/0x20 [ 511.794063][T21032] strncpy_from_user+0x21/0x250 [ 511.798955][T21032] getname_flags+0xb8/0x3f0 [ 511.803455][T21032] getname+0x15/0x20 [ 511.807338][T21032] do_sys_openat2+0x6d/0x2b0 [ 511.811938][T21032] __x64_sys_openat+0xef/0x110 [ 511.816747][T21032] do_syscall_64+0x44/0xa0 [ 511.821165][T21032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 511.827057][T21032] RIP: 0033:0x7fcb1768ca04 [ 511.831461][T21032] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 511.851233][T21032] RSP: 002b:00007fcb1544fcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 511.859669][T21032] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fcb1768ca04 [ 511.867693][T21032] RDX: 0000000000000000 RSI: 00007fcb1544fd60 RDI: 00000000ffffff9c [ 511.875654][T21032] RBP: 00007fcb1544fd60 R08: 0000000000000000 R09: 0000000000000000 [ 511.883658][T21032] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 511.891684][T21032] R13: 00007ffdcf15caaf R14: 00007fcb15450300 R15: 0000000000022000 [ 511.902373][T21036] loop1: detected capacity change from 0 to 1054 [ 511.904445][T21039] loop3: detected capacity change from 0 to 4 [ 511.909288][T21036] EXT4-fs (loop1): bad geometry: block count 616 exceeds size of device (527 blocks) [ 511.926217][T21038] loop2: detected capacity change from 0 to 4 [ 511.933240][T21038] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:13 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) (fail_nth: 3) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 511.933267][T21039] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 511.965246][T21045] FAULT_INJECTION: forcing a failure. [ 511.965246][T21045] name failslab, interval 1, probability 0, space 0, times 0 [ 511.977441][T21037] EXT4-fs warning: 4 callbacks suppressed [ 511.977457][T21037] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 511.977906][T21045] CPU: 0 PID: 21045 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 512.004960][T21045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.015139][T21045] Call Trace: [ 512.018421][T21045] dump_stack_lvl+0xd6/0x122 [ 512.023083][T21045] dump_stack+0x11/0x1b [ 512.027256][T21045] should_fail+0x23c/0x250 [ 512.031682][T21045] ? __alloc_file+0x2e/0x1a0 [ 512.036336][T21045] __should_failslab+0x81/0x90 [ 512.041111][T21045] should_failslab+0x5/0x20 [ 512.045626][T21045] kmem_cache_alloc+0x4f/0x320 [ 512.050468][T21045] __alloc_file+0x2e/0x1a0 [ 512.054976][T21045] alloc_empty_file+0xcd/0x1c0 [ 512.059832][T21045] path_openat+0x6a/0x1eb0 [ 512.064345][T21045] ? __this_cpu_preempt_check+0x18/0x20 [ 512.069926][T21045] ? mem_cgroup_update_lru_size+0x50/0xe0 [ 512.075725][T21045] ? __list_add_valid+0x28/0x90 [ 512.080616][T21045] ? __pagevec_lru_add+0x243/0x270 [ 512.085787][T21045] ? _kstrtoull+0x301/0x320 [ 512.090299][T21045] do_filp_open+0x105/0x220 [ 512.094850][T21045] do_sys_openat2+0xb5/0x2b0 [ 512.099519][T21045] __x64_sys_openat+0xef/0x110 [ 512.104356][T21045] do_syscall_64+0x44/0xa0 [ 512.108788][T21045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.114906][T21045] RIP: 0033:0x7fcb1768ca04 [ 512.119384][T21045] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 12:40:13 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000500ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:13 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) (fail_nth: 4) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 512.139096][T21045] RSP: 002b:00007fcb1544fcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 512.147748][T21045] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fcb1768ca04 [ 512.155911][T21045] RDX: 0000000000000000 RSI: 00007fcb1544fd60 RDI: 00000000ffffff9c [ 512.163895][T21045] RBP: 00007fcb1544fd60 R08: 0000000000000000 R09: 0000000000000000 [ 512.171966][T21045] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 512.179947][T21045] R13: 00007ffdcf15caaf R14: 00007fcb15450300 R15: 0000000000022000 [ 512.221284][T21050] loop2: detected capacity change from 0 to 4 [ 512.229927][T21052] FAULT_INJECTION: forcing a failure. [ 512.229927][T21052] name failslab, interval 1, probability 0, space 0, times 0 [ 512.230342][T21050] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 512.242593][T21052] CPU: 0 PID: 21052 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 512.250843][T21046] FAULT_INJECTION: forcing a failure. [ 512.250843][T21046] name failslab, interval 1, probability 0, space 0, times 0 [ 512.258778][T21052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.258792][T21052] Call Trace: [ 512.258800][T21052] dump_stack_lvl+0xd6/0x122 [ 512.289254][T21052] dump_stack+0x11/0x1b [ 512.293472][T21052] should_fail+0x23c/0x250 [ 512.297883][T21052] ? security_file_alloc+0x30/0x190 [ 512.303102][T21052] __should_failslab+0x81/0x90 [ 512.307859][T21052] should_failslab+0x5/0x20 [ 512.312361][T21052] kmem_cache_alloc+0x4f/0x320 [ 512.317141][T21052] security_file_alloc+0x30/0x190 [ 512.322178][T21052] __alloc_file+0x83/0x1a0 [ 512.326656][T21052] alloc_empty_file+0xcd/0x1c0 [ 512.331431][T21052] path_openat+0x6a/0x1eb0 [ 512.335902][T21052] ? debug_smp_processor_id+0x18/0x20 [ 512.341266][T21052] ? try_charge_memcg+0x9a3/0xa10 [ 512.346285][T21052] ? __rcu_read_unlock+0x5c/0x290 [ 512.351426][T21052] ? _kstrtoull+0x301/0x320 [ 512.355924][T21052] do_filp_open+0x105/0x220 [ 512.360428][T21052] do_sys_openat2+0xb5/0x2b0 [ 512.365037][T21052] __x64_sys_openat+0xef/0x110 [ 512.369874][T21052] do_syscall_64+0x44/0xa0 [ 512.374348][T21052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.380261][T21052] RIP: 0033:0x7fcb1768ca04 [ 512.384666][T21052] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 512.404261][T21052] RSP: 002b:00007fcb1544fcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 512.412662][T21052] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007fcb1768ca04 [ 512.420624][T21052] RDX: 0000000000000000 RSI: 00007fcb1544fd60 RDI: 00000000ffffff9c [ 512.428603][T21052] RBP: 00007fcb1544fd60 R08: 0000000000000000 R09: 0000000000000000 [ 512.436563][T21052] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 512.444556][T21052] R13: 00007ffdcf15caaf R14: 00007fcb15450300 R15: 0000000000022000 [ 512.452581][T21046] CPU: 1 PID: 21046 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 512.461010][T21046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.471066][T21046] Call Trace: [ 512.474342][T21046] dump_stack_lvl+0xd6/0x122 [ 512.478948][T21046] dump_stack+0x11/0x1b [ 512.483169][T21046] should_fail+0x23c/0x250 [ 512.487590][T21046] ? kcalloc+0x32/0x40 [ 512.491675][T21046] __should_failslab+0x81/0x90 [ 512.496579][T21046] should_failslab+0x5/0x20 [ 512.501133][T21046] __kmalloc+0x6f/0x370 [ 512.505296][T21046] ? kmem_cache_alloc_trace+0x24b/0x350 [ 512.510853][T21046] kcalloc+0x32/0x40 [ 512.514820][T21046] alloc_pipe_info+0x1be/0x350 [ 512.519690][T21046] splice_direct_to_actor+0x5f7/0x650 [ 512.525101][T21046] ? security_file_permission+0x7c/0xa0 [ 512.530652][T21046] ? do_splice_direct+0x190/0x190 [ 512.535736][T21046] ? security_file_permission+0x87/0xa0 [ 512.541288][T21046] do_splice_direct+0x106/0x190 [ 512.546160][T21046] do_sendfile+0x675/0xc40 [ 512.550586][T21046] __x64_sys_sendfile64+0x102/0x140 [ 512.555795][T21046] do_syscall_64+0x44/0xa0 [ 512.560210][T21046] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.566192][T21046] RIP: 0033:0x7f3c2a8b8ae9 12:40:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000006c02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 512.570604][T21046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 512.590206][T21046] RSP: 002b:00007f3c2860e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 512.598668][T21046] RAX: ffffffffffffffda RBX: 00007f3c2a9cc020 RCX: 00007f3c2a8b8ae9 [ 512.606847][T21046] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000007 [ 512.614826][T21046] RBP: 00007f3c2860e1d0 R08: 0000000000000000 R09: 0000000000000000 12:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x406, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000600ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 512.622828][T21046] R10: 00000000ffffff04 R11: 0000000000000246 R12: 0000000000000001 [ 512.630820][T21046] R13: 00007ffd5342bdcf R14: 00007f3c2860e300 R15: 0000000000022000 [ 512.640906][T21058] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 512.646194][T21059] loop1: detected capacity change from 0 to 1054 [ 512.664730][T21061] loop3: detected capacity change from 0 to 4 [ 512.691742][T21061] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 512.700522][T21064] loop2: detected capacity change from 0 to 4 [ 512.714384][T21059] EXT4-fs (loop1): bad geometry: block count 620 exceeds size of device (527 blocks) [ 512.714405][T21064] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) (fail_nth: 3) 12:40:14 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x5, 0x5, 0x8a, 0x2, 0x0, 0x10bc, 0x80a00, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x4}, 0x100, 0x8001, 0x2, 0x5, 0x3, 0x85, 0x1000, 0x0, 0x10001, 0x0, 0x986}, r3, 0xc, r0, 0x8) sendfile(r1, r2, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffff04) 12:40:14 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) (fail_nth: 5) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000037202000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 512.757117][T21061] loop3: detected capacity change from 0 to 4 [ 512.763847][T21061] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 512.785189][T21064] loop2: detected capacity change from 0 to 4 [ 512.791882][T21064] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 512.832362][T21069] loop1: detected capacity change from 0 to 1054 [ 512.839792][T21069] EXT4-fs (loop1): bad geometry: block count 626 exceeds size of device (527 blocks) [ 512.854630][T21067] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 512.868183][T21070] FAULT_INJECTION: forcing a failure. [ 512.868183][T21070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.881326][T21070] CPU: 1 PID: 21070 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 512.889748][T21070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.899843][T21070] Call Trace: [ 512.903116][T21070] dump_stack_lvl+0xd6/0x122 [ 512.907718][T21070] dump_stack+0x11/0x1b [ 512.911881][T21070] should_fail+0x23c/0x250 [ 512.916305][T21070] should_fail_usercopy+0x16/0x20 [ 512.921335][T21070] _copy_to_user+0x1c/0x90 [ 512.925791][T21070] simple_read_from_buffer+0xab/0x120 [ 512.931109][T21074] FAULT_INJECTION: forcing a failure. [ 512.931109][T21074] name failslab, interval 1, probability 0, space 0, times 0 [ 512.931165][T21070] proc_fail_nth_read+0x10d/0x150 [ 512.948758][T21070] ? proc_fault_inject_write+0x230/0x230 [ 512.954414][T21070] vfs_read+0x1e6/0x750 [ 512.958577][T21070] ? __fget_light+0x219/0x260 [ 512.963285][T21070] ksys_read+0xd9/0x190 [ 512.967430][T21070] __x64_sys_read+0x3e/0x50 [ 512.971963][T21070] do_syscall_64+0x44/0xa0 [ 512.976400][T21070] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 512.982333][T21070] RIP: 0033:0x7fcb1768c69c [ 512.986734][T21070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 513.006405][T21070] RSP: 002b:00007fcb15450170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 513.014813][T21070] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fcb1768c69c [ 513.022776][T21070] RDX: 000000000000000f RSI: 00007fcb154501e0 RDI: 0000000000000003 [ 513.030785][T21070] RBP: 00007fcb154501d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.038751][T21070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.046716][T21070] R13: 00007ffdcf15caaf R14: 00007fcb15450300 R15: 0000000000022000 [ 513.054816][T21074] CPU: 0 PID: 21074 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 513.063239][T21074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.073409][T21074] Call Trace: [ 513.076695][T21074] dump_stack_lvl+0xd6/0x122 [ 513.081311][T21074] dump_stack+0x11/0x1b [ 513.085549][T21074] should_fail+0x23c/0x250 [ 513.089973][T21074] ? __iomap_dio_rw+0x141/0xf20 [ 513.094825][T21074] __should_failslab+0x81/0x90 [ 513.099597][T21074] should_failslab+0x5/0x20 [ 513.104115][T21074] kmem_cache_alloc_trace+0x52/0x350 [ 513.109586][T21074] ? avc_has_perm_noaudit+0x1c0/0x270 [ 513.115015][T21074] __iomap_dio_rw+0x141/0xf20 [ 513.119783][T21074] ? rmqueue_pcplist+0x157/0x1f0 [ 513.124725][T21074] iomap_dio_rw+0x30/0x70 [ 513.129064][T21074] ext4_file_read_iter+0x21a/0x290 [ 513.134183][T21074] generic_file_splice_read+0x24f/0x330 [ 513.139815][T21074] ? splice_shrink_spd+0x60/0x60 [ 513.144768][T21074] splice_direct_to_actor+0x2aa/0x650 [ 513.150240][T21074] ? do_splice_direct+0x190/0x190 [ 513.155316][T21074] do_splice_direct+0x106/0x190 [ 513.160177][T21074] do_sendfile+0x675/0xc40 [ 513.164603][T21074] __x64_sys_sendfile64+0x102/0x140 [ 513.169814][T21074] do_syscall_64+0x44/0xa0 [ 513.174335][T21074] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 513.180330][T21074] RIP: 0033:0x7f3c2a8b8ae9 [ 513.184744][T21074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 513.204381][T21074] RSP: 002b:00007f3c2860e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 513.212796][T21074] RAX: ffffffffffffffda RBX: 00007f3c2a9cc020 RCX: 00007f3c2a8b8ae9 [ 513.220850][T21074] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000007 12:40:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000700ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 513.228869][T21074] RBP: 00007f3c2860e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.236840][T21074] R10: 00000000ffffff04 R11: 0000000000000246 R12: 0000000000000001 [ 513.244881][T21074] R13: 00007ffd5342bdcf R14: 00007f3c2860e300 R15: 0000000000022000 [ 513.255963][T21075] loop3: detected capacity change from 0 to 4 [ 513.266967][T21075] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 513.269539][T21079] loop2: detected capacity change from 0 to 4 12:40:14 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 513.283363][T21079] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 513.307101][T21075] loop3: detected capacity change from 0 to 4 [ 513.307521][T21079] loop2: detected capacity change from 0 to 4 [ 513.325166][T21081] loop1: detected capacity change from 0 to 1054 12:40:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000800ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000007a02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 513.325787][T21075] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 513.338696][T21081] EXT4-fs (loop1): bad geometry: block count 628 exceeds size of device (527 blocks) 12:40:14 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x2) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 513.391323][T21086] loop3: detected capacity change from 0 to 4 [ 513.393512][T21087] loop1: detected capacity change from 0 to 1054 [ 513.399195][T21086] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 513.414732][T21087] EXT4-fs (loop1): bad geometry: block count 634 exceeds size of device (527 blocks) [ 513.439439][T21086] loop3: detected capacity change from 0 to 4 [ 513.446124][T21086] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 513.485905][T21092] loop2: detected capacity change from 0 to 4 [ 513.493109][T21092] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 513.527134][T21092] loop2: detected capacity change from 0 to 4 12:40:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) (fail_nth: 4) [ 513.663838][T21076] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:40:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000000}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000280)={0x0, 0x80, 0xc8, 0x3, 0x7, 0x20, 0x0, 0x6, 0x6001, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x100000000, 0x98}, 0x10000, 0x7fff, 0x64fdf105, 0x9, 0x2, 0x8, 0x9, 0x0, 0x8ad7, 0x0, 0x6}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r2, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r1, r2, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r5, 0x40045402, &(0x7f00000000c0)=0x1) r6 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f00000004c0)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000800)={0x5, 0x72e, 0x8, 0x0, 0x0, [{{r2}, 0x2}, {{}, 0x7}, {{}, 0x3}, {}, {{}, 0x20}, {{}, 0x1}, {{r5}, 0xfffffffffffffffc}, {{r6}, 0x8001}]}) sendfile(r4, r1, 0x0, 0xffffff04) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000240)={0x2, &(0x7f0000000180)=[{0x7fff, 0x8, 0x0, 0x6}, {0x0, 0x0, 0x40, 0x87}]}, 0x10) 12:40:15 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x3) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000017b02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x604, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000900ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 513.740819][T21100] loop3: detected capacity change from 0 to 4 [ 513.753324][T21098] loop1: detected capacity change from 0 to 1054 [ 513.760446][T21100] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 513.770598][T21104] loop2: detected capacity change from 0 to 4 [ 513.777547][T21104] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:15 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x4) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 513.787115][T21098] EXT4-fs (loop1): bad geometry: block count 635 exceeds size of device (527 blocks) [ 513.800051][T21106] FAULT_INJECTION: forcing a failure. [ 513.800051][T21106] name failslab, interval 1, probability 0, space 0, times 0 [ 513.800582][T21104] loop2: detected capacity change from 0 to 4 [ 513.812690][T21106] CPU: 0 PID: 21106 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 513.819382][T21104] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x40) sendfile(r2, r0, 0x0, 0xffffff04) [ 513.827221][T21106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.827237][T21106] Call Trace: [ 513.827245][T21106] dump_stack_lvl+0xd6/0x122 [ 513.852942][T21106] dump_stack+0x11/0x1b [ 513.857116][T21106] should_fail+0x23c/0x250 [ 513.861575][T21106] ? mempool_alloc_slab+0x16/0x20 [ 513.866610][T21106] __should_failslab+0x81/0x90 [ 513.871390][T21106] should_failslab+0x5/0x20 [ 513.875942][T21106] kmem_cache_alloc+0x4f/0x320 [ 513.880840][T21106] mempool_alloc_slab+0x16/0x20 [ 513.885709][T21106] ? mempool_free+0x130/0x130 [ 513.890367][T21106] mempool_alloc+0x9d/0x310 [ 513.895037][T21106] ? preempt_count_add+0x4e/0x90 [ 513.900031][T21106] ? _raw_read_unlock+0x13/0x30 [ 513.903607][T21111] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 513.904868][T21106] ? jbd2_transaction_committed+0xad/0xc0 [ 513.923525][T21106] bio_alloc_bioset+0xcc/0x560 [ 513.928277][T21106] ? iov_iter_npages+0x37b/0x390 [ 513.933218][T21106] ? iomap_dio_bio_iter+0x562/0xc70 [ 513.938407][T21106] iomap_dio_bio_iter+0x5ed/0xc70 [ 513.943434][T21106] ? ext4_alloc_da_blocks+0x100/0x100 [ 513.948909][T21106] __iomap_dio_rw+0x88b/0xf20 [ 513.953711][T21106] iomap_dio_rw+0x30/0x70 [ 513.958043][T21106] ext4_file_read_iter+0x21a/0x290 [ 513.963144][T21106] generic_file_splice_read+0x24f/0x330 [ 513.968714][T21106] ? splice_shrink_spd+0x60/0x60 [ 513.973771][T21106] splice_direct_to_actor+0x2aa/0x650 [ 513.979211][T21106] ? do_splice_direct+0x190/0x190 [ 513.984234][T21106] do_splice_direct+0x106/0x190 [ 513.989118][T21106] do_sendfile+0x675/0xc40 [ 513.993559][T21106] __x64_sys_sendfile64+0x102/0x140 [ 513.998778][T21106] do_syscall_64+0x44/0xa0 [ 514.003202][T21106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 514.009234][T21106] RIP: 0033:0x7f3c2a8b8ae9 [ 514.013663][T21106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 514.033489][T21106] RSP: 002b:00007f3c2860e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 514.041915][T21106] RAX: ffffffffffffffda RBX: 00007f3c2a9cc020 RCX: 00007f3c2a8b8ae9 [ 514.049888][T21106] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000007 [ 514.057952][T21106] RBP: 00007f3c2860e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 514.066100][T21106] R10: 00000000ffffff04 R11: 0000000000000246 R12: 0000000000000001 [ 514.074062][T21106] R13: 00007ffd5342bdcf R14: 00007f3c2860e300 R15: 0000000000022000 12:40:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000a00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000008302000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:15 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x7) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 514.092299][T21100] loop3: detected capacity change from 0 to 4 [ 514.117076][T21100] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 514.125153][T21115] loop2: detected capacity change from 0 to 4 12:40:15 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0xf) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 514.136253][T21115] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 514.141627][T21118] loop1: detected capacity change from 0 to 1054 [ 514.151332][T21118] EXT4-fs (loop1): bad geometry: block count 643 exceeds size of device (527 blocks) [ 514.181319][T21115] loop2: detected capacity change from 0 to 4 12:40:15 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff04) 12:40:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000001a102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000b00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:15 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x18) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 514.574598][T21130] loop3: detected capacity change from 0 to 4 [ 514.584785][T21131] loop1: detected capacity change from 0 to 1054 [ 514.592926][T21132] loop2: detected capacity change from 0 to 4 [ 514.593743][T21130] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 514.609321][T21132] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:16 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x204) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000c00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 514.613216][T21131] EXT4-fs (loop1): bad geometry: block count 673 exceeds size of device (527 blocks) [ 514.636844][T21132] loop2: detected capacity change from 0 to 4 [ 514.658610][T21130] loop3: detected capacity change from 0 to 4 [ 514.665166][T21130] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:16 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x55, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x6}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) dup(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = dup(r2) lseek(r3, 0x101, 0x0) getdents(r3, &(0x7f0000000240)=""/66, 0x42) 12:40:16 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x300) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:16 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003a802000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) [ 514.719326][T21138] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed 12:40:16 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x402) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 514.767045][T21149] loop3: detected capacity change from 0 to 4 [ 514.768380][T21150] loop1: detected capacity change from 0 to 1054 [ 514.774217][T21143] loop2: detected capacity change from 0 to 4 [ 514.786620][T21143] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 514.795910][T21150] EXT4-fs (loop1): bad geometry: block count 680 exceeds size of device (527 blocks) [ 514.805343][T21149] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 514.826574][T21143] loop2: detected capacity change from 0 to 4 [ 514.844201][T21152] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 514.877197][T21149] loop3: detected capacity change from 0 to 4 [ 514.883836][T21149] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0x7ffff000) 12:40:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000d00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:16 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x406) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:16 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003aa02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:16 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x604) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 515.518266][T21162] loop2: detected capacity change from 0 to 4 [ 515.518632][T21164] loop3: detected capacity change from 0 to 5 [ 515.525336][T21162] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 515.539021][T21159] loop1: detected capacity change from 0 to 1054 [ 515.546335][T21159] EXT4-fs (loop1): bad geometry: block count 682 exceeds size of device (527 blocks) 12:40:17 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x700) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 515.561298][T21164] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 515.562092][T21162] loop2: detected capacity change from 0 to 4 [ 515.577458][T21162] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000e00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:17 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003ab02000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:17 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0xf00) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x4002000, &(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340), {0x1c}, &(0x7f0000000380)=""/54, 0x36, &(0x7f0000000440)=""/119, &(0x7f00000004c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4, {r0}}, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x3, 0x1, 0x40, 0x4, 0x0, 0xa2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000180)}, 0x46a80, 0x3ff, 0x9, 0x5, 0x2, 0x2, 0x6, 0x0, 0x0, 0x0, 0x6}, r2, 0xf, 0xffffffffffffffff, 0x8) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) open$dir(&(0x7f0000000580)='./file1\x00', 0x111a00, 0x100) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffff04) [ 515.617680][T21164] loop3: detected capacity change from 0 to 5 [ 515.635525][T21164] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 515.638013][T21156] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 515.696443][T21178] loop2: detected capacity change from 0 to 4 [ 515.703415][T21178] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 515.720644][T21181] loop1: detected capacity change from 0 to 1054 [ 515.728307][T21178] loop2: detected capacity change from 0 to 4 [ 515.734879][T21178] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000f00ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 515.744328][T21181] EXT4-fs (loop1): bad geometry: block count 683 exceeds size of device (527 blocks) [ 515.771766][T21183] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 515.796874][T21186] loop2: detected capacity change from 0 to 4 [ 515.804169][T21186] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 515.837032][T21186] loop2: detected capacity change from 0 to 4 12:40:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffff02) 12:40:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xb00, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:17 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x1800) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:17 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c102000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) [ 516.413584][T21194] loop3: detected capacity change from 0 to 5 [ 516.432777][T21199] loop2: detected capacity change from 0 to 4 [ 516.439817][T21199] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 516.448988][T21197] loop1: detected capacity change from 0 to 1054 12:40:17 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x2000) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 516.458872][T21194] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 516.472909][T21197] EXT4-fs (loop1): bad geometry: block count 705 exceeds size of device (527 blocks) [ 516.483771][T21199] loop2: detected capacity change from 0 to 4 [ 516.490535][T21199] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001100ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:17 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c402000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 516.552479][T21194] loop3: detected capacity change from 0 to 5 [ 516.559467][T21194] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 516.573230][T21206] loop1: detected capacity change from 0 to 1054 [ 516.585242][T21209] EXT4-fs warning (device sda1): ext4_resize_begin:73: There are errors in the filesystem, so online resizing is not allowed [ 516.590345][T21206] EXT4-fs (loop1): bad geometry: block count 708 exceeds size of device (527 blocks) 12:40:18 executing program 5: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x60, 0x0, 0x0, 0xfc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) renameat2(r1, &(0x7f0000000140)='./file1\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x7, 0x3, 0xdf, 0x0, 0x1}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001e40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000001900)=ANY=[@ANYRES32=r2, @ANYRES16, @ANYRES32, @ANYRES64, @ANYBLOB="d101bb7f13f7a647d7067cd7c59affc17c9da961ae1aeccdae704a7693fb9c172fa9371f58b125d4147dc1c8c5ea259127dcce46128ef93c208d7c023b356b73d819f6e513d0d79793f107c3d34895b0038aeff22129f49653706fdfbdc25621998d7d50fbd78defb524b9d8e97ad93d70c5cecb431f98468f79b4ae6982f6fb389a3ced7c662b09b58f949c0f81f5f919150c3a3c5551fe426efeb9f4a715858e9ea6ac00000000000000919d3cb23034280ba87711cd5a091c9414b357225052640efea60418e994de389b3c2cbea3cc7652d7997c45af7e14f7790e23be5143f93804659400"/255], 0x3}, 0x1, 0x0, 0x0, 0x20000014}, 0x40025) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000200)={r2, 0x8, 0x7}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001e40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000001900)=ANY=[@ANYRES32=r3, @ANYRES16, @ANYRES32, @ANYRES64, @ANYBLOB="d101bb7f13f7a647d7067cd7c59affc17c9da961ae1aeccdae704a7693fb9c172fa9371f58b125d4147dc1c8c5ea259127dcce46128ef93c208d7c023b356b73d819f6e513d0d79793f107c3d34895b0038aeff22129f49653706fdfbdc25621998d7d50fbd78defb524b9d8e97ad93d70c5cecb431f98468f79b4ae6982f6fb389a3ced7c662b09b58f949c0f81f5f919150c3a3c5551fe426efeb9f4a715858e9ea6ac00000000000000919d3cb23034280ba87711cd5a091c9414b357225052640efea60418e994de389b3c2cbea3cc7652d7997c45af7e14f7790e23be5143f93804659400"/255], 0x3}, 0x1, 0x0, 0x0, 0x20000014}, 0x40025) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000200)={r3, 0x8, 0x7}) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f0000000800)={0xa, 0x0, {0x3, @struct={0x3, 0x42af}, r2, 0x1, 0x2c, 0x3ff, 0x8, 0x1, 0x40d, @usage=0x4, 0x3, 0x5, [0x2, 0x6, 0x4, 0x8000, 0x807e, 0x6]}, {0x97, @struct={0xce5b, 0x1}, r3, 0x3, 0x1f, 0x160, 0xff, 0xce90, 0x0, @struct={0x5, 0x7}, 0x75, 0x4, [0x100000000, 0xfffffffffffffff8, 0x1, 0x1, 0x3f, 0x1]}, {0x1ff, @struct={0xffe0, 0x3}, 0x0, 0x1c000000000000, 0x17feb73a, 0x7a66, 0x9, 0x0, 0x440, @usage=0x8001, 0x6, 0x8, [0x8, 0x1f, 0x8000, 0x6, 0x7fff, 0x3412]}, {0x8, 0x7, 0x9}}) sendfile(r0, r1, 0x0, 0x7fffffff) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r0, 0x0, 0xffffff04) 12:40:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xc00, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:18 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c502000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 516.623696][T21211] loop2: detected capacity change from 0 to 4 [ 516.630726][T21211] EXT4-fs (loop2): Unrecognized mount option "6" or missing value 12:40:18 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x3f00) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 516.678118][T21216] loop3: detected capacity change from 0 to 6 [ 516.685293][T21211] loop2: detected capacity change from 0 to 4 [ 516.691942][T21211] EXT4-fs (loop2): Unrecognized mount option "6" or missing value [ 516.702387][T21217] loop1: detected capacity change from 0 to 1054 [ 516.710622][T21216] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) [ 516.720866][T21217] EXT4-fs (loop1): bad geometry: block count 709 exceeds size of device (527 blocks) [ 516.792238][T21216] loop3: detected capacity change from 0 to 6 [ 516.799171][T21216] EXT4-fs (loop3): bad geometry: first data block 0 is beyond end of filesystem (0) 12:40:18 executing program 4: syz_open_dev$loop(&(0x7f00000001c0), 0x800003ba, 0x4000) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) 12:40:18 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c001200ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='6']) 12:40:18 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="20000003c602000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 12:40:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xd00, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="20000a000000000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000180)) 12:40:18 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./file0\x