80000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 40) 12:55:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffb) 12:55:35 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000) 12:55:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, r1}}, 0x128) (async) [ 1086.258328][T17488] loop5: detected capacity change from 0 to 545 [ 1086.261078][T17497] loop4: detected capacity change from 0 to 545 [ 1086.265001][T17496] loop2: detected capacity change from 0 to 545 [ 1086.286899][T17497] FAULT_INJECTION: forcing a failure. [ 1086.286899][T17497] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.299604][T17497] CPU: 1 PID: 17497 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1086.310628][T17497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.311925][T17496] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1086.320753][T17497] Call Trace: [ 1086.320761][T17497] [ 1086.320768][T17497] dump_stack_lvl+0xd6/0x122 [ 1086.320797][T17497] dump_stack+0x11/0x1b [ 1086.320818][T17497] should_fail+0x23c/0x250 [ 1086.348574][T17497] ? kobject_uevent_env+0x1d7/0xcc0 [ 1086.353776][T17497] __should_failslab+0x81/0x90 [ 1086.358569][T17497] should_failslab+0x5/0x20 [ 1086.363100][T17497] kmem_cache_alloc_trace+0x52/0x350 [ 1086.368401][T17497] ? _printk+0x76/0x97 [ 1086.372490][T17497] kobject_uevent_env+0x1d7/0xcc0 [ 1086.377541][T17497] ? preempt_count_add+0x4e/0x90 [ 1086.382566][T17497] kobject_uevent+0x18/0x20 [ 1086.387070][T17497] loop_configure+0xd8a/0xf50 [ 1086.391750][T17497] lo_ioctl+0x633/0x1260 [ 1086.396000][T17497] ? folio_mark_dirty+0x84/0xe0 [ 1086.400853][T17497] ? unlock_page+0x37/0x50 [ 1086.405271][T17497] ? __rcu_read_unlock+0x5c/0x290 [ 1086.410348][T17497] ? blkdev_common_ioctl+0x438/0x1060 [ 1086.415793][T17497] ? selinux_file_ioctl+0x522/0x590 [ 1086.421081][T17497] ? do_vfs_ioctl+0x819/0x14a0 [ 1086.425841][T17497] ? lo_release+0x120/0x120 [ 1086.430349][T17497] blkdev_ioctl+0x20e/0x440 [ 1086.434914][T17497] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 1086.440376][T17497] __se_sys_ioctl+0xcb/0x140 [ 1086.444972][T17497] __x64_sys_ioctl+0x3f/0x50 [ 1086.449575][T17497] do_syscall_64+0x44/0xd0 [ 1086.453988][T17497] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.459918][T17497] RIP: 0033:0x7f533ffa3e07 [ 1086.464332][T17497] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1086.483995][T17497] RSP: 002b:00007f533f119f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.492434][T17497] RAX: ffffffffffffffda RBX: 00007f533ffed9c8 RCX: 00007f533ffa3e07 [ 1086.500408][T17497] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:55:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffd) 12:55:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, r1}}, 0x128) (rerun: 32) [ 1086.508377][T17497] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1086.516423][T17497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1086.524392][T17497] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1086.532367][T17497] [ 1086.540532][T17488] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = getpid() pidfd_open(r1, 0x0) (async) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) socket$inet6(0xa, 0x5, 0x8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:36 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x5000000) 12:55:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x80000, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x8}, r1}}, 0x128) [ 1086.563105][T17497] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1086.587734][T17497] EXT4-fs (loop4): get root inode failed [ 1086.593451][T17497] EXT4-fs (loop4): mount failed [ 1086.602541][T17520] loop2: detected capacity change from 0 to 545 12:55:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffe) [ 1086.616924][T17520] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1086.647940][T17525] loop5: detected capacity change from 0 to 545 [ 1086.671553][T17529] loop2: detected capacity change from 0 to 545 [ 1086.683192][T17525] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1086.696745][T17529] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:36 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x5dc0}, 0x1c) 12:55:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) setsockopt$inet6_int(r1, 0x29, 0x41, &(0x7f0000000000)=0x1000007, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x200, @private0, 0x2}, 0x1c) 12:55:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 41) 12:55:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x80000, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x8}, r1}}, 0x128) 12:55:36 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6000000) 12:55:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000) [ 1087.131841][T17533] loop4: detected capacity change from 0 to 545 [ 1087.141529][T17540] loop2: detected capacity change from 0 to 545 [ 1087.141934][T17541] loop5: detected capacity change from 0 to 545 [ 1087.156208][T17533] FAULT_INJECTION: forcing a failure. [ 1087.156208][T17533] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.158421][T17540] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1087.168827][T17533] CPU: 1 PID: 17533 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1087.178908][T17541] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1087.188223][T17533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.188237][T17533] Call Trace: [ 1087.188243][T17533] [ 1087.188279][T17533] dump_stack_lvl+0xd6/0x122 [ 1087.188303][T17533] dump_stack+0x11/0x1b [ 1087.188323][T17533] should_fail+0x23c/0x250 [ 1087.188343][T17533] ? kobject_uevent_env+0x1d7/0xcc0 [ 1087.206825][T17533] __should_failslab+0x81/0x90 [ 1087.236144][T17533] should_failslab+0x5/0x20 [ 1087.240654][T17533] kmem_cache_alloc_trace+0x52/0x350 [ 1087.245947][T17533] ? _printk+0x76/0x97 [ 1087.250027][T17533] kobject_uevent_env+0x1d7/0xcc0 [ 1087.255047][T17533] ? preempt_count_add+0x4e/0x90 [ 1087.259989][T17533] kobject_uevent+0x18/0x20 [ 1087.264631][T17533] loop_configure+0xd8a/0xf50 [ 1087.269352][T17533] lo_ioctl+0x633/0x1260 [ 1087.273645][T17533] ? folio_mark_dirty+0x84/0xe0 [ 1087.278514][T17533] ? unlock_page+0x37/0x50 [ 1087.282995][T17533] ? __rcu_read_unlock+0x5c/0x290 [ 1087.288026][T17533] ? blkdev_common_ioctl+0x438/0x1060 [ 1087.293445][T17533] ? selinux_file_ioctl+0x522/0x590 [ 1087.298643][T17533] ? do_vfs_ioctl+0x819/0x14a0 [ 1087.303418][T17533] ? lo_release+0x120/0x120 [ 1087.307925][T17533] blkdev_ioctl+0x20e/0x440 [ 1087.312492][T17533] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 1087.317955][T17533] __se_sys_ioctl+0xcb/0x140 [ 1087.322554][T17533] __x64_sys_ioctl+0x3f/0x50 [ 1087.327294][T17533] do_syscall_64+0x44/0xd0 [ 1087.331789][T17533] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.337710][T17533] RIP: 0033:0x7f533ffa3e07 [ 1087.342123][T17533] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1087.361788][T17533] RSP: 002b:00007f533f119f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.370227][T17533] RAX: ffffffffffffffda RBX: 00007f533ffed9c8 RCX: 00007f533ffa3e07 12:55:36 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6040000) 12:55:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x80000, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83", 0x0, 0x8}, r1}}, 0x128) [ 1087.378193][T17533] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1087.386189][T17533] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1087.394194][T17533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1087.402217][T17533] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1087.410233][T17533] [ 1087.420537][T17533] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:55:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in={0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x118) r2 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0xff, "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", 0x40, 0x3, 0x81, 0x8, 0x0, 0x8, 0x90, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r3 = open(&(0x7f0000000080)='./file0\x00', 0x2a2082, 0x40) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @empty, 0x1ff}, {0xa, 0x4e22, 0x280000, @private1, 0x6a3}, r6, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) [ 1087.439046][T17533] EXT4-fs (loop4): get root inode failed [ 1087.444842][T17533] EXT4-fs (loop4): mount failed 12:55:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000000000) 12:55:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 42) [ 1087.486517][T17557] loop5: detected capacity change from 0 to 545 [ 1087.501011][T17557] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in={0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x118) r2 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0xff, "c9d2c8dbeb2f0d9a8c19237ee5aeef50a735c3a28ce7ced3705c5ef5ac731f9cd10a5e064324606af4f05a47da628e85c0feb752e8af0fa52cff8403d0f94d1d589f55419085fc3b43b24d64e868771430d1beba53a76c862187f5a0fd8ee1706984b9ba1f2aae0be5c341153a2efd272c94fceb15a77bf383894a8f656a09df8aa466d54c354b6f8a1a07557a36d48d874b2722c8ae8af87e85fb75ea88edac8b3c1d4fefd1a47995e623bdae43bbd606942227b7becab1e8be04e6a7e2549698d09b2d4305d846fb53263441aedc6a652352657ed35352cc22ad475e8dd1f03f430134425520a9d0fb6d02af48eafa5ae71eac08d5a796d8ef2c5cfec95143", 0x40, 0x3, 0x81, 0x8, 0x0, 0x8, 0x90, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) r3 = open(&(0x7f0000000080)='./file0\x00', 0x2a2082, 0x40) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @empty, 0x1ff}, {0xa, 0x4e22, 0x280000, @private1, 0x6a3}, r6, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in={0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x118) (async) dup3(r0, r0, 0x80000) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0xff, "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", 0x40, 0x3, 0x81, 0x8, 0x0, 0x8, 0x90, 0x1}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) (async) open(&(0x7f0000000080)='./file0\x00', 0x2a2082, 0x40) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r4) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @empty, 0x1ff}, {0xa, 0x4e22, 0x280000, @private1, 0x6a3}, r6, 0x2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) (async) [ 1087.527141][T17560] loop2: detected capacity change from 0 to 545 [ 1087.542553][T17563] loop4: detected capacity change from 0 to 545 [ 1087.562262][T17563] FAULT_INJECTION: forcing a failure. [ 1087.562262][T17563] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.574932][T17563] CPU: 0 PID: 17563 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1087.586125][T17563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.596171][T17563] Call Trace: [ 1087.599439][T17563] [ 1087.602368][T17563] dump_stack_lvl+0xd6/0x122 [ 1087.606964][T17563] dump_stack+0x11/0x1b [ 1087.611124][T17563] should_fail+0x23c/0x250 [ 1087.615612][T17563] __should_failslab+0x81/0x90 [ 1087.620445][T17563] should_failslab+0x5/0x20 [ 1087.624956][T17563] kmem_cache_alloc_node+0x61/0x2d0 [ 1087.630164][T17563] ? __alloc_skb+0xf0/0x450 [ 1087.634670][T17563] __alloc_skb+0xf0/0x450 [ 1087.639054][T17563] alloc_uevent_skb+0x5b/0x120 [ 1087.643824][T17563] kobject_uevent_env+0x8cd/0xcc0 [ 1087.648852][T17563] kobject_uevent+0x18/0x20 [ 1087.653348][T17563] loop_configure+0xd8a/0xf50 [ 1087.658027][T17563] lo_ioctl+0x633/0x1260 [ 1087.662353][T17563] ? folio_mark_dirty+0x84/0xe0 [ 1087.667246][T17563] ? unlock_page+0x37/0x50 [ 1087.671689][T17563] ? __rcu_read_unlock+0x5c/0x290 [ 1087.676722][T17563] ? blkdev_common_ioctl+0x438/0x1060 [ 1087.682251][T17563] ? selinux_file_ioctl+0x522/0x590 [ 1087.687449][T17563] ? do_vfs_ioctl+0x819/0x14a0 [ 1087.692230][T17563] ? lo_release+0x120/0x120 [ 1087.696744][T17563] blkdev_ioctl+0x20e/0x440 [ 1087.701251][T17563] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 1087.706722][T17563] __se_sys_ioctl+0xcb/0x140 [ 1087.711319][T17563] __x64_sys_ioctl+0x3f/0x50 [ 1087.715916][T17563] do_syscall_64+0x44/0xd0 [ 1087.720334][T17563] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.726289][T17563] RIP: 0033:0x7f533ffa3e07 [ 1087.730697][T17563] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1087.750303][T17563] RSP: 002b:00007f533f119f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.758716][T17563] RAX: ffffffffffffffda RBX: 00007f533ffed9c8 RCX: 00007f533ffa3e07 [ 1087.766809][T17563] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1087.774775][T17563] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1087.782742][T17563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1087.790730][T17563] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1087.798695][T17563] [ 1087.804580][T17560] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1087.828695][T17563] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1087.845141][T17563] EXT4-fs (loop4): get root inode failed [ 1087.850833][T17563] EXT4-fs (loop4): mount failed 12:55:37 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x6000}, 0x1c) 12:55:37 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7000000) 12:55:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in={0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x118) r2 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0xff, "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", 0x40, 0x3, 0x81, 0x8, 0x0, 0x8, 0x90, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) r3 = open(&(0x7f0000000080)='./file0\x00', 0x2a2082, 0x40) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @empty, 0x1ff}, {0xa, 0x4e22, 0x280000, @private1, 0x6a3}, r6, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in={0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x118) (async) dup3(r0, r0, 0x80000) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0xff, "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", 0x40, 0x3, 0x81, 0x8, 0x0, 0x8, 0x90, 0x1}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) open(&(0x7f0000000080)='./file0\x00', 0x2a2082, 0x40) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r4) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @empty, 0x1ff}, {0xa, 0x4e22, 0x280000, @private1, 0x6a3}, r6, 0x2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0xa}}, 0x20) (async) 12:55:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x80000000000) 12:55:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 43) 12:55:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) setsockopt$inet6_int(r1, 0x29, 0x41, &(0x7f0000000000)=0x1000007, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x200, @private0, 0x2}, 0x1c) [ 1088.003502][T17572] loop4: detected capacity change from 0 to 545 [ 1088.003512][T17576] loop2: detected capacity change from 0 to 545 [ 1088.017233][T17577] loop5: detected capacity change from 0 to 545 [ 1088.028997][T17572] FAULT_INJECTION: forcing a failure. [ 1088.028997][T17572] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.036279][T17576] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) setsockopt$inet6_int(r1, 0x29, 0x41, &(0x7f0000000000)=0x1000007, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x200, @private0, 0x2}, 0x1c) [ 1088.041669][T17572] CPU: 0 PID: 17572 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1088.061054][T17572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.071115][T17572] Call Trace: [ 1088.071122][T17572] [ 1088.071129][T17572] dump_stack_lvl+0xd6/0x122 [ 1088.081896][T17572] dump_stack+0x11/0x1b [ 1088.086059][T17572] should_fail+0x23c/0x250 [ 1088.090473][T17572] __should_failslab+0x81/0x90 [ 1088.095280][T17572] should_failslab+0x5/0x20 [ 1088.099769][T17572] kmem_cache_alloc_node+0x61/0x2d0 [ 1088.104992][T17572] ? __alloc_skb+0xf0/0x450 [ 1088.109474][T17572] __alloc_skb+0xf0/0x450 [ 1088.113796][T17572] alloc_uevent_skb+0x5b/0x120 [ 1088.118561][T17572] kobject_uevent_env+0x8cd/0xcc0 [ 1088.123636][T17572] kobject_uevent+0x18/0x20 [ 1088.128157][T17572] loop_configure+0xd8a/0xf50 [ 1088.132826][T17572] lo_ioctl+0x633/0x1260 [ 1088.137141][T17572] ? folio_mark_dirty+0x84/0xe0 [ 1088.141993][T17572] ? unlock_page+0x37/0x50 [ 1088.146579][T17572] ? __rcu_read_unlock+0x5c/0x290 [ 1088.151594][T17572] ? blkdev_common_ioctl+0x438/0x1060 [ 1088.157034][T17572] ? selinux_file_ioctl+0x522/0x590 [ 1088.162249][T17572] ? do_vfs_ioctl+0x819/0x14a0 [ 1088.167046][T17572] ? lo_release+0x120/0x120 [ 1088.171543][T17572] blkdev_ioctl+0x20e/0x440 [ 1088.176068][T17572] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 1088.181526][T17572] __se_sys_ioctl+0xcb/0x140 [ 1088.186228][T17572] __x64_sys_ioctl+0x3f/0x50 [ 1088.190806][T17572] do_syscall_64+0x44/0xd0 [ 1088.195316][T17572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.201197][T17572] RIP: 0033:0x7f533ffa3e07 [ 1088.205587][T17572] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1088.225174][T17572] RSP: 002b:00007f533f119f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.233667][T17572] RAX: ffffffffffffffda RBX: 00007f533ffed9c8 RCX: 00007f533ffa3e07 [ 1088.241616][T17572] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:55:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x30, 0x0, @ib={0x1b, 0x7f, 0xc9e, {"787cdf562199753d96734a9bad1bc17c"}, 0x1, 0x6, 0x8}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 12:55:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x30, 0x0, @ib={0x1b, 0x7f, 0xc9e, {"787cdf562199753d96734a9bad1bc17c"}, 0x1, 0x6, 0x8}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x30, 0x0, @ib={0x1b, 0x7f, 0xc9e, {"787cdf562199753d96734a9bad1bc17c"}, 0x1, 0x6, 0x8}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) (async) [ 1088.249564][T17572] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1088.257539][T17572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1088.265559][T17572] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1088.273511][T17572] [ 1088.290992][T17577] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:37 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x8000000) 12:55:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000) [ 1088.308085][T17572] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1088.325751][T17572] EXT4-fs (loop4): get root inode failed [ 1088.331465][T17572] EXT4-fs (loop4): mount failed [ 1088.348731][T17602] loop5: detected capacity change from 0 to 545 12:55:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x30, 0x0, @ib={0x1b, 0x7f, 0xc9e, {"787cdf562199753d96734a9bad1bc17c"}, 0x1, 0x6, 0x8}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) [ 1088.349085][T17604] loop2: detected capacity change from 0 to 545 [ 1088.378323][T17604] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1088.389319][T17602] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:38 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x80fe}, 0x1c) 12:55:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 44) 12:55:38 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x9000000) 12:55:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x1, @private2, 0x5}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0xfffffffe, 0x0, 0x0, 0x0, @ib={0x1b, 0x100, 0x986, {"1c5814ad24a725a170188bccca86cf15"}, 0x0, 0x1, 0x10000}, @ib={0x1b, 0x5c5a, 0x200, {"8b630a8830581aafb9150ae7ec648643"}, 0x1, 0x6, 0x7}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r6 = fsmount(0xffffffffffffffff, 0x1, 0x5) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) sendfile(r1, r7, 0x0, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x101, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}, @ib={0x1b, 0x5, 0x80000000, {"bad7327b8b8a331f9ccb4d540fe42d61"}, 0xe2bb, 0x81, 0x9}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) 12:55:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000) [ 1088.873351][T17611] loop4: detected capacity change from 0 to 545 [ 1088.883016][T17616] loop2: detected capacity change from 0 to 545 [ 1088.883746][T17617] loop5: detected capacity change from 0 to 545 [ 1088.895719][T17611] FAULT_INJECTION: forcing a failure. [ 1088.895719][T17611] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.908349][T17611] CPU: 1 PID: 17611 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1088.919366][T17611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.919381][T17611] Call Trace: [ 1088.919387][T17611] [ 1088.919393][T17611] dump_stack_lvl+0xd6/0x122 [ 1088.934335][T17616] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1088.935605][T17611] dump_stack+0x11/0x1b [ 1088.952710][T17611] should_fail+0x23c/0x250 [ 1088.957146][T17611] __should_failslab+0x81/0x90 [ 1088.961892][T17611] should_failslab+0x5/0x20 [ 1088.966430][T17611] kmem_cache_alloc_node_trace+0x61/0x310 [ 1088.972201][T17611] ? __kmalloc_node_track_caller+0x30/0x40 [ 1088.972228][T17611] __kmalloc_node_track_caller+0x30/0x40 [ 1088.972253][T17611] ? alloc_uevent_skb+0x5b/0x120 [ 1088.988542][T17611] __alloc_skb+0x19d/0x450 [ 1088.992955][T17611] alloc_uevent_skb+0x5b/0x120 [ 1088.997714][T17611] kobject_uevent_env+0x8cd/0xcc0 [ 1089.002717][T17611] kobject_uevent+0x18/0x20 [ 1089.007201][T17611] loop_configure+0xd8a/0xf50 [ 1089.011871][T17611] lo_ioctl+0x633/0x1260 [ 1089.016155][T17611] ? folio_mark_dirty+0x84/0xe0 [ 1089.021009][T17611] ? unlock_page+0x37/0x50 [ 1089.025451][T17611] ? __rcu_read_unlock+0x5c/0x290 [ 1089.030459][T17611] ? blkdev_common_ioctl+0x438/0x1060 [ 1089.035824][T17611] ? selinux_file_ioctl+0x522/0x590 [ 1089.041076][T17611] ? do_vfs_ioctl+0x819/0x14a0 [ 1089.045834][T17611] ? lo_release+0x120/0x120 [ 1089.050316][T17611] blkdev_ioctl+0x20e/0x440 [ 1089.054895][T17611] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 1089.060330][T17611] __se_sys_ioctl+0xcb/0x140 [ 1089.064900][T17611] __x64_sys_ioctl+0x3f/0x50 [ 1089.069520][T17611] do_syscall_64+0x44/0xd0 [ 1089.073917][T17611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.079839][T17611] RIP: 0033:0x7f533ffa3e07 [ 1089.084237][T17611] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1089.103905][T17611] RSP: 002b:00007f533f119f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.112352][T17611] RAX: ffffffffffffffda RBX: 00007f533ffed9c8 RCX: 00007f533ffa3e07 12:55:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @dev={0xfe, 0x80, '\x00', 0xe}}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) close_range(r0, r2, 0x0) 12:55:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) (async) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x1, @private2, 0x5}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0xfffffffe, 0x0, 0x0, 0x0, @ib={0x1b, 0x100, 0x986, {"1c5814ad24a725a170188bccca86cf15"}, 0x0, 0x1, 0x10000}, @ib={0x1b, 0x5c5a, 0x200, {"8b630a8830581aafb9150ae7ec648643"}, 0x1, 0x6, 0x7}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r6 = fsmount(0xffffffffffffffff, 0x1, 0x5) (async) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) (async, rerun: 64) sendfile(r1, r7, 0x0, 0x2) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x101, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}, @ib={0x1b, 0x5, 0x80000000, {"bad7327b8b8a331f9ccb4d540fe42d61"}, 0xe2bb, 0x81, 0x9}}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) [ 1089.120314][T17611] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1089.128264][T17611] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1089.136220][T17611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1089.144169][T17611] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 1089.152200][T17611] 12:55:38 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xa000000) 12:55:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000) [ 1089.176292][T17617] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1089.185081][T17611] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1089.197066][T17611] EXT4-fs (loop4): get root inode failed [ 1089.202723][T17611] EXT4-fs (loop4): mount failed 12:55:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x1, @private2, 0x5}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0xfffffffe, 0x0, 0x0, 0x0, @ib={0x1b, 0x100, 0x986, {"1c5814ad24a725a170188bccca86cf15"}, 0x0, 0x1, 0x10000}, @ib={0x1b, 0x5c5a, 0x200, {"8b630a8830581aafb9150ae7ec648643"}, 0x1, 0x6, 0x7}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r6 = fsmount(0xffffffffffffffff, 0x1, 0x5) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) sendfile(r1, r7, 0x0, 0x2) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x101, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}, @ib={0x1b, 0x5, 0x80000000, {"bad7327b8b8a331f9ccb4d540fe42d61"}, 0xe2bb, 0x81, 0x9}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r3) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x1, @private2, 0x5}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r2, 0xfffffffe, 0x0, 0x0, 0x0, @ib={0x1b, 0x100, 0x986, {"1c5814ad24a725a170188bccca86cf15"}, 0x0, 0x1, 0x10000}, @ib={0x1b, 0x5c5a, 0x200, {"8b630a8830581aafb9150ae7ec648643"}, 0x1, 0x6, 0x7}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) fsmount(0xffffffffffffffff, 0x1, 0x5) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r7) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) (async) sendfile(r1, r7, 0x0, 0x2) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x101, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xffffffff}, @ib={0x1b, 0x5, 0x80000000, {"bad7327b8b8a331f9ccb4d540fe42d61"}, 0xe2bb, 0x81, 0x9}}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r5}}, 0x128) (async) 12:55:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 45) [ 1089.232562][T17636] loop2: detected capacity change from 0 to 545 [ 1089.243249][T17636] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1089.268496][T17642] loop5: detected capacity change from 0 to 545 12:55:38 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xb000000) [ 1089.276671][T17642] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1089.281815][T17645] loop4: detected capacity change from 0 to 545 [ 1089.294232][T17645] FAULT_INJECTION: forcing a failure. [ 1089.294232][T17645] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.306864][T17645] CPU: 0 PID: 17645 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1089.317917][T17645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.317931][T17645] Call Trace: [ 1089.317938][T17645] [ 1089.317945][T17645] dump_stack_lvl+0xd6/0x122 [ 1089.338842][T17645] dump_stack+0x11/0x1b [ 1089.343042][T17645] should_fail+0x23c/0x250 [ 1089.347455][T17645] ? getname_flags+0x84/0x3f0 [ 1089.352125][T17645] __should_failslab+0x81/0x90 [ 1089.356891][T17645] should_failslab+0x5/0x20 [ 1089.361421][T17645] kmem_cache_alloc+0x4f/0x320 [ 1089.366198][T17645] getname_flags+0x84/0x3f0 [ 1089.370693][T17645] __x64_sys_mkdir+0x31/0x50 [ 1089.375356][T17645] do_syscall_64+0x44/0xd0 [ 1089.379766][T17645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.385715][T17645] RIP: 0033:0x7f533ffa3157 [ 1089.390162][T17645] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1089.409759][T17645] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1089.418209][T17645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1089.426172][T17645] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1089.434135][T17645] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1089.442097][T17645] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1089.450109][T17645] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1089.458096][T17645] [ 1089.510993][T17648] loop5: detected capacity change from 0 to 545 [ 1089.526418][T17648] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:39 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xc05d}, 0x1c) 12:55:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7ffffffffffff) 12:55:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 46) 12:55:39 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc000000) [ 1089.760666][T17656] loop5: detected capacity change from 0 to 545 [ 1089.762265][T17654] loop4: detected capacity change from 0 to 545 [ 1089.767920][T17655] loop2: detected capacity change from 0 to 545 [ 1089.781836][T17654] FAULT_INJECTION: forcing a failure. [ 1089.781836][T17654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1089.795040][T17654] CPU: 1 PID: 17654 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1089.806238][T17654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.816370][T17654] Call Trace: [ 1089.819641][T17654] [ 1089.822582][T17654] dump_stack_lvl+0xd6/0x122 [ 1089.827177][T17654] dump_stack+0x11/0x1b [ 1089.831343][T17654] should_fail+0x23c/0x250 [ 1089.835883][T17654] should_fail_usercopy+0x16/0x20 [ 1089.840908][T17654] strncpy_from_user+0x21/0x250 [ 1089.845775][T17654] getname_flags+0xb8/0x3f0 [ 1089.850304][T17654] __x64_sys_mkdir+0x31/0x50 [ 1089.854962][T17654] do_syscall_64+0x44/0xd0 [ 1089.859376][T17654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.865303][T17654] RIP: 0033:0x7f533ffa3157 [ 1089.869731][T17654] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1089.889429][T17654] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1089.897845][T17654] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1089.905865][T17654] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1089.913903][T17654] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1089.921873][T17654] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1089.929965][T17654] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1089.938134][T17654] [ 1089.944788][T17656] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:39 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @dev={0xfe, 0x80, '\x00', 0xe}}, 0x1c) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) close_range(r0, r2, 0x0) 12:55:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xa000000000000) 12:55:39 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xd000000) 12:55:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 47) [ 1089.958364][T17655] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1090.023197][T17670] loop2: detected capacity change from 0 to 545 [ 1090.030090][T17672] loop5: detected capacity change from 0 to 545 [ 1090.046537][T17677] loop4: detected capacity change from 0 to 545 [ 1090.053596][T17677] FAULT_INJECTION: forcing a failure. [ 1090.053596][T17677] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.054896][T17670] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1090.066248][T17677] CPU: 1 PID: 17677 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1090.066276][T17677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.066287][T17677] Call Trace: [ 1090.066293][T17677] [ 1090.066299][T17677] dump_stack_lvl+0xd6/0x122 [ 1090.106580][T17677] dump_stack+0x11/0x1b [ 1090.110743][T17677] should_fail+0x23c/0x250 [ 1090.115171][T17677] ? __d_alloc+0x36/0x370 [ 1090.119503][T17677] __should_failslab+0x81/0x90 [ 1090.124310][T17677] should_failslab+0x5/0x20 [ 1090.128835][T17677] kmem_cache_alloc+0x4f/0x320 [ 1090.133645][T17677] __d_alloc+0x36/0x370 [ 1090.137812][T17677] d_alloc+0x2a/0x110 [ 1090.141801][T17677] __lookup_hash+0x8f/0x180 [ 1090.146310][T17677] filename_create+0xfc/0x270 [ 1090.151017][T17677] do_mkdirat+0x53/0x2c0 [ 1090.155262][T17677] __x64_sys_mkdir+0x40/0x50 [ 1090.159923][T17677] do_syscall_64+0x44/0xd0 [ 1090.164408][T17677] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.170330][T17677] RIP: 0033:0x7f533ffa3157 [ 1090.174781][T17677] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1090.183262][T17672] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1090.194382][T17677] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1090.194407][T17677] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 12:55:39 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xe000000) 12:55:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1090.194419][T17677] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1090.227217][T17677] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1090.235185][T17677] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1090.243156][T17677] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1090.251165][T17677] [ 1090.333834][T17687] loop5: detected capacity change from 0 to 545 [ 1090.354795][T17687] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:40 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfc00}, 0x1c) 12:55:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) pipe(&(0x7f0000000080)) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 48) 12:55:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x100000000000000) 12:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf000000) [ 1090.629156][T17693] loop2: detected capacity change from 0 to 545 [ 1090.635927][T17694] loop5: detected capacity change from 0 to 545 [ 1090.650469][T17694] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1090.659724][T17693] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1090.671330][T17700] loop4: detected capacity change from 0 to 545 [ 1090.683791][T17700] FAULT_INJECTION: forcing a failure. [ 1090.683791][T17700] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.696433][T17700] CPU: 0 PID: 17700 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1090.707463][T17700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.717587][T17700] Call Trace: [ 1090.720867][T17700] [ 1090.723798][T17700] dump_stack_lvl+0xd6/0x122 [ 1090.728440][T17700] dump_stack+0x11/0x1b [ 1090.732654][T17700] should_fail+0x23c/0x250 [ 1090.737147][T17700] ? ext4_alloc_inode+0x19/0x1b0 [ 1090.742090][T17700] __should_failslab+0x81/0x90 [ 1090.746923][T17700] ? ext4_mark_recovery_complete+0x1c0/0x1c0 [ 1090.752911][T17700] should_failslab+0x5/0x20 [ 1090.757419][T17700] kmem_cache_alloc+0x4f/0x320 [ 1090.762187][T17700] ? ext4_mark_recovery_complete+0x1c0/0x1c0 [ 1090.768216][T17700] ext4_alloc_inode+0x19/0x1b0 [ 1090.773013][T17700] ? ext4_mark_recovery_complete+0x1c0/0x1c0 [ 1090.779020][T17700] new_inode_pseudo+0x38/0x190 [ 1090.783788][T17700] new_inode+0x21/0x100 [ 1090.787957][T17700] __ext4_new_inode+0xda/0x24e0 [ 1090.792874][T17700] ? __dquot_initialize+0x13c/0x770 [ 1090.798069][T17700] ext4_mkdir+0x1d9/0x620 [ 1090.802406][T17700] vfs_mkdir+0x216/0x320 [ 1090.806646][T17700] do_mkdirat+0x12e/0x2c0 [ 1090.811067][T17700] __x64_sys_mkdir+0x40/0x50 [ 1090.815656][T17700] do_syscall_64+0x44/0xd0 [ 1090.820075][T17700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.826026][T17700] RIP: 0033:0x7f533ffa3157 [ 1090.830432][T17700] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1090.850029][T17700] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1090.858438][T17700] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1090.866398][T17700] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1090.874483][T17700] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 12:55:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @dev={0xfe, 0x80, '\x00', 0xe}}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) close_range(r0, r2, 0x0) 12:55:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async, rerun: 32) pipe(&(0x7f0000000080)) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x10000000) 12:55:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) pipe(&(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1090.882515][T17700] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1090.890485][T17700] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1090.898484][T17700] 12:55:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x200000000000000) 12:55:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 49) [ 1090.952755][T17710] loop2: detected capacity change from 0 to 545 [ 1090.956166][T17713] loop5: detected capacity change from 0 to 545 [ 1090.969233][T17717] loop4: detected capacity change from 0 to 545 [ 1090.976363][T17717] FAULT_INJECTION: forcing a failure. [ 1090.976363][T17717] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.988997][T17717] CPU: 0 PID: 17717 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1091.000082][T17717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.010215][T17717] Call Trace: [ 1091.013541][T17717] [ 1091.016455][T17717] dump_stack_lvl+0xd6/0x122 [ 1091.021145][T17717] dump_stack+0x11/0x1b [ 1091.025305][T17717] should_fail+0x23c/0x250 [ 1091.029804][T17717] ? security_inode_alloc+0x30/0x180 [ 1091.035079][T17717] __should_failslab+0x81/0x90 [ 1091.039856][T17717] should_failslab+0x5/0x20 [ 1091.044348][T17717] kmem_cache_alloc+0x4f/0x320 [ 1091.049110][T17717] security_inode_alloc+0x30/0x180 [ 1091.054206][T17717] inode_init_always+0x214/0x3e0 [ 1091.059129][T17717] ? ext4_mark_recovery_complete+0x1c0/0x1c0 [ 1091.065203][T17717] new_inode_pseudo+0x6f/0x190 [ 1091.070020][T17717] new_inode+0x21/0x100 [ 1091.074254][T17717] __ext4_new_inode+0xda/0x24e0 [ 1091.079092][T17717] ? __dquot_initialize+0x13c/0x770 [ 1091.084272][T17717] ext4_mkdir+0x1d9/0x620 [ 1091.088593][T17717] vfs_mkdir+0x216/0x320 [ 1091.092900][T17717] do_mkdirat+0x12e/0x2c0 [ 1091.097228][T17717] __x64_sys_mkdir+0x40/0x50 [ 1091.101804][T17717] do_syscall_64+0x44/0xd0 [ 1091.106204][T17717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.112162][T17717] RIP: 0033:0x7f533ffa3157 [ 1091.116640][T17717] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1091.136315][T17717] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1091.144709][T17717] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 12:55:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}, @ib={0x1b, 0x8, 0x4ecc, {"44d5e0aaf1b18feca7c63d5d57da81b9"}, 0x6, 0x5, 0x15b}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1091.152664][T17717] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1091.160658][T17717] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1091.168614][T17717] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1091.176565][T17717] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1091.184577][T17717] [ 1091.191474][T17710] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1091.206805][T17713] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:40 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfe80}, 0x1c) 12:55:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x204000000000000) 12:55:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 50) 12:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x11000000) 12:55:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}, @ib={0x1b, 0x8, 0x4ecc, {"44d5e0aaf1b18feca7c63d5d57da81b9"}, 0x6, 0x5, 0x15b}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r2) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}, @ib={0x1b, 0x8, 0x4ecc, {"44d5e0aaf1b18feca7c63d5d57da81b9"}, 0x6, 0x5, 0x15b}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) [ 1091.494308][T17730] loop2: detected capacity change from 0 to 545 [ 1091.498567][T17732] loop5: detected capacity change from 0 to 545 [ 1091.501625][T17731] loop4: detected capacity change from 0 to 545 [ 1091.518391][T17731] FAULT_INJECTION: forcing a failure. [ 1091.518391][T17731] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.522754][T17732] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1091.531059][T17731] CPU: 1 PID: 17731 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1091.531083][T17731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.560508][T17731] Call Trace: [ 1091.563782][T17731] [ 1091.566757][T17731] dump_stack_lvl+0xd6/0x122 [ 1091.571357][T17731] dump_stack+0x11/0x1b [ 1091.575516][T17731] should_fail+0x23c/0x250 [ 1091.580004][T17731] ? jbd2__journal_start+0xa1/0x290 [ 1091.585201][T17731] __should_failslab+0x81/0x90 [ 1091.590052][T17731] should_failslab+0x5/0x20 [ 1091.594630][T17731] kmem_cache_alloc+0x4f/0x320 [ 1091.599460][T17731] ? __getblk_gfp+0x3f/0x530 [ 1091.604063][T17731] jbd2__journal_start+0xa1/0x290 [ 1091.609086][T17731] __ext4_journal_start_sb+0x10f/0x290 [ 1091.614543][T17731] __ext4_new_inode+0xcc4/0x24e0 [ 1091.619506][T17731] ext4_mkdir+0x1d9/0x620 [ 1091.623851][T17731] vfs_mkdir+0x216/0x320 [ 1091.628149][T17731] do_mkdirat+0x12e/0x2c0 [ 1091.632478][T17731] __x64_sys_mkdir+0x40/0x50 [ 1091.637071][T17731] do_syscall_64+0x44/0xd0 [ 1091.641518][T17731] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.647452][T17731] RIP: 0033:0x7f533ffa3157 [ 1091.651863][T17731] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1091.671596][T17731] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1091.680006][T17731] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1091.688025][T17731] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1091.695990][T17731] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1091.703957][T17731] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1091.711926][T17731] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1091.720012][T17731] [ 1091.723094][T17731] EXT4-fs error (device sda1) in __ext4_new_inode:1085: Out of memory 12:55:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendto$l2tp6(r2, &(0x7f0000000040)="3a5a2876ba6e19f1617df48a64c60dbc37fdc34bb2232ee5dee22b45712be48812247c16b47f28dd795a57b6020378006e162432622b566854836b449a43a2e7841ae7813aa65a308f70c9738f5f99ee4463e70fc17bebf263ea32e2ae27f551d92010d5e7dbe782dd684c5110344882b6b6f05fccaf2b9a04eb3783b0408efadb4aadca367f13ac70dc0bf855bde053c20218ae4260ddff8a95fb75f3f15a58c231e86a6a7290098926e00e5393dc83783b65b4819b4052d40ef6a58d9f649a13a05da1c940fc6a13f1ffef00c6d9508e24fd32ca", 0xd5, 0x50, 0x0, 0x0) 12:55:41 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x12000000) 12:55:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}, @ib={0x1b, 0x8, 0x4ecc, {"44d5e0aaf1b18feca7c63d5d57da81b9"}, 0x6, 0x5, 0x15b}}}, 0x118) (rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x300000000000000) [ 1091.742707][T17730] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 51) [ 1091.792194][T17745] loop5: detected capacity change from 0 to 545 [ 1091.806503][T17748] loop2: detected capacity change from 0 to 545 [ 1091.808078][T17749] loop4: detected capacity change from 0 to 545 [ 1091.819994][T17749] FAULT_INJECTION: forcing a failure. [ 1091.819994][T17749] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.820030][T17745] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1091.832656][T17749] CPU: 0 PID: 17749 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1091.852064][T17749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.852088][T17749] Call Trace: [ 1091.852094][T17749] [ 1091.852101][T17749] dump_stack_lvl+0xd6/0x122 [ 1091.872950][T17749] dump_stack+0x11/0x1b [ 1091.877110][T17749] should_fail+0x23c/0x250 [ 1091.881542][T17749] ? sidtab_sid2str_get+0xb0/0x140 [ 1091.886734][T17749] __should_failslab+0x81/0x90 [ 1091.891499][T17749] should_failslab+0x5/0x20 [ 1091.896037][T17749] __kmalloc_track_caller+0x6d/0x370 [ 1091.901326][T17749] kmemdup+0x21/0x50 [ 1091.905312][T17749] sidtab_sid2str_get+0xb0/0x140 [ 1091.910247][T17749] security_sid_to_context_core+0x1d0/0x2d0 [ 1091.916211][T17749] security_sid_to_context_force+0x2f/0x40 [ 1091.922025][T17749] selinux_inode_init_security+0x4e4/0x590 [ 1091.927864][T17749] security_inode_init_security+0xe4/0x260 [ 1091.933734][T17749] ? ext4_init_security+0x40/0x40 [ 1091.938760][T17749] ? ext4_init_acl+0x1eb/0x230 [ 1091.943526][T17749] __ext4_new_inode+0x1ffd/0x24e0 [ 1091.950716][T17749] ext4_mkdir+0x1d9/0x620 [ 1091.955112][T17749] vfs_mkdir+0x216/0x320 [ 1091.959474][T17749] do_mkdirat+0x12e/0x2c0 [ 1091.963822][T17749] __x64_sys_mkdir+0x40/0x50 [ 1091.968463][T17749] do_syscall_64+0x44/0xd0 [ 1091.972950][T17749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.978849][T17749] RIP: 0033:0x7f533ffa3157 [ 1091.983263][T17749] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1092.002869][T17749] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1092.011278][T17749] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1092.019356][T17749] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1092.027321][T17749] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1092.035294][T17749] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:55:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async, rerun: 32) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 32) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async, rerun: 64) sendto$l2tp6(r2, &(0x7f0000000040)="3a5a2876ba6e19f1617df48a64c60dbc37fdc34bb2232ee5dee22b45712be48812247c16b47f28dd795a57b6020378006e162432622b566854836b449a43a2e7841ae7813aa65a308f70c9738f5f99ee4463e70fc17bebf263ea32e2ae27f551d92010d5e7dbe782dd684c5110344882b6b6f05fccaf2b9a04eb3783b0408efadb4aadca367f13ac70dc0bf855bde053c20218ae4260ddff8a95fb75f3f15a58c231e86a6a7290098926e00e5393dc83783b65b4819b4052d40ef6a58d9f649a13a05da1c940fc6a13f1ffef00c6d9508e24fd32ca", 0xd5, 0x50, 0x0, 0x0) (rerun: 64) 12:55:41 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x19020000) [ 1092.043262][T17749] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1092.051246][T17749] [ 1092.079296][T17748] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1092.136263][T17760] loop5: detected capacity change from 0 to 545 [ 1092.145653][T17760] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:41 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xff00}, 0x1c) 12:55:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 52) 12:55:41 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendto$l2tp6(r2, &(0x7f0000000040)="3a5a2876ba6e19f1617df48a64c60dbc37fdc34bb2232ee5dee22b45712be48812247c16b47f28dd795a57b6020378006e162432622b566854836b449a43a2e7841ae7813aa65a308f70c9738f5f99ee4463e70fc17bebf263ea32e2ae27f551d92010d5e7dbe782dd684c5110344882b6b6f05fccaf2b9a04eb3783b0408efadb4aadca367f13ac70dc0bf855bde053c20218ae4260ddff8a95fb75f3f15a58c231e86a6a7290098926e00e5393dc83783b65b4819b4052d40ef6a58d9f649a13a05da1c940fc6a13f1ffef00c6d9508e24fd32ca", 0xd5, 0x50, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) sendto$l2tp6(r2, &(0x7f0000000040)="3a5a2876ba6e19f1617df48a64c60dbc37fdc34bb2232ee5dee22b45712be48812247c16b47f28dd795a57b6020378006e162432622b566854836b449a43a2e7841ae7813aa65a308f70c9738f5f99ee4463e70fc17bebf263ea32e2ae27f551d92010d5e7dbe782dd684c5110344882b6b6f05fccaf2b9a04eb3783b0408efadb4aadca367f13ac70dc0bf855bde053c20218ae4260ddff8a95fb75f3f15a58c231e86a6a7290098926e00e5393dc83783b65b4819b4052d40ef6a58d9f649a13a05da1c940fc6a13f1ffef00c6d9508e24fd32ca", 0xd5, 0x50, 0x0, 0x0) (async) 12:55:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x400000000000000) 12:55:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:41 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x20000000) 12:55:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) [ 1092.369834][T17768] loop4: detected capacity change from 0 to 545 [ 1092.376711][T17769] loop5: detected capacity change from 0 to 545 [ 1092.388992][T17771] loop2: detected capacity change from 0 to 545 [ 1092.395234][T17768] FAULT_INJECTION: forcing a failure. [ 1092.395234][T17768] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.407936][T17768] CPU: 1 PID: 17768 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1092.418956][T17768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.429003][T17768] Call Trace: [ 1092.429010][T17768] [ 1092.429017][T17768] dump_stack_lvl+0xd6/0x122 [ 1092.439767][T17768] dump_stack+0x11/0x1b [ 1092.443921][T17768] should_fail+0x23c/0x250 [ 1092.448338][T17768] ? sidtab_sid2str_get+0xb0/0x140 [ 1092.453456][T17768] __should_failslab+0x81/0x90 [ 1092.458257][T17768] should_failslab+0x5/0x20 [ 1092.462784][T17768] __kmalloc_track_caller+0x6d/0x370 [ 1092.468073][T17768] kmemdup+0x21/0x50 [ 1092.471975][T17768] sidtab_sid2str_get+0xb0/0x140 [ 1092.476919][T17768] security_sid_to_context_core+0x1d0/0x2d0 [ 1092.482819][T17768] security_sid_to_context_force+0x2f/0x40 [ 1092.488708][T17768] selinux_inode_init_security+0x4e4/0x590 [ 1092.494521][T17768] security_inode_init_security+0xe4/0x260 [ 1092.500324][T17768] ? ext4_init_security+0x40/0x40 [ 1092.505398][T17768] ? ext4_init_acl+0x1eb/0x230 [ 1092.510173][T17768] __ext4_new_inode+0x1ffd/0x24e0 [ 1092.515352][T17768] ext4_mkdir+0x1d9/0x620 [ 1092.519770][T17768] vfs_mkdir+0x216/0x320 [ 1092.524009][T17768] do_mkdirat+0x12e/0x2c0 [ 1092.528411][T17768] __x64_sys_mkdir+0x40/0x50 [ 1092.533012][T17768] do_syscall_64+0x44/0xd0 [ 1092.537447][T17768] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.543350][T17768] RIP: 0033:0x7f533ffa3157 [ 1092.547761][T17768] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 12:55:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x101, 0x4) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) [ 1092.567367][T17768] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1092.575922][T17768] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1092.583887][T17768] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1092.591998][T17768] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1092.599966][T17768] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1092.607927][T17768] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1092.615925][T17768] 12:55:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x101, 0x4) (async, rerun: 64) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 64) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 53) 12:55:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x13) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0xfffd, @remote}, @in6={0xa, 0x4e23, 0x0, @private0, 0xef}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x400, "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", 0x0, 0x0, 0x0, 0xf8}, r2}}, 0x128) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8001, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = fcntl$dupfd(r3, 0x0, r3) fcntl$dupfd(r5, 0x0, r6) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x111, 0x9}}, 0x20) [ 1092.634881][T17769] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1092.662811][T17771] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1092.688837][T17806] loop4: detected capacity change from 0 to 545 [ 1092.696348][T17806] FAULT_INJECTION: forcing a failure. [ 1092.696348][T17806] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.709479][T17806] CPU: 1 PID: 17806 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1092.720501][T17806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.730552][T17806] Call Trace: [ 1092.733894][T17806] [ 1092.736838][T17806] dump_stack_lvl+0xd6/0x122 [ 1092.741435][T17806] dump_stack+0x11/0x1b [ 1092.745649][T17806] should_fail+0x23c/0x250 [ 1092.750068][T17806] ? __es_insert_extent+0x43d/0xac0 [ 1092.755292][T17806] __should_failslab+0x81/0x90 [ 1092.760053][T17806] should_failslab+0x5/0x20 [ 1092.764567][T17806] kmem_cache_alloc+0x4f/0x320 [ 1092.769333][T17806] __es_insert_extent+0x43d/0xac0 [ 1092.774375][T17806] ext4_es_insert_extent+0x1bb/0x15c0 [ 1092.779748][T17806] ext4_ext_map_blocks+0xbfe/0x1940 [ 1092.785014][T17806] ext4_map_blocks+0x183/0xb90 [ 1092.789777][T17806] ext4_getblk+0xa4/0x340 [ 1092.794109][T17806] ext4_bread+0x28/0xf0 [ 1092.798278][T17806] ext4_append+0x89/0x140 [ 1092.802607][T17806] ? ext4_init_new_dir+0xb9/0x390 [ 1092.807630][T17806] ext4_init_new_dir+0x12a/0x390 [ 1092.812566][T17806] ext4_mkdir+0x251/0x620 [ 1092.816922][T17806] vfs_mkdir+0x216/0x320 [ 1092.821163][T17806] do_mkdirat+0x12e/0x2c0 [ 1092.825494][T17806] __x64_sys_mkdir+0x40/0x50 [ 1092.830233][T17806] do_syscall_64+0x44/0xd0 [ 1092.834659][T17806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.840550][T17806] RIP: 0033:0x7f533ffa3157 [ 1092.844955][T17806] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1092.864683][T17806] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1092.873093][T17806] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1092.881056][T17806] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1092.889069][T17806] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1092.897156][T17806] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1092.905351][T17806] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1092.913324][T17806] [ 1092.926489][T17806] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1092.938527][T17806] EXT4-fs (loop4): get root inode failed [ 1092.944264][T17806] EXT4-fs (loop4): mount failed 12:55:42 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x1000000}, 0x1c) 12:55:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x101, 0x4) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:42 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x21020000) 12:55:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x500000000000000) 12:55:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 54) [ 1093.483497][T17814] loop4: detected capacity change from 0 to 545 [ 1093.486277][T17817] loop2: detected capacity change from 0 to 545 [ 1093.490069][T17816] loop5: detected capacity change from 0 to 545 [ 1093.507659][T17817] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1093.510612][T17814] FAULT_INJECTION: forcing a failure. [ 1093.510612][T17814] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.528674][T17814] CPU: 1 PID: 17814 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1093.539785][T17814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.549838][T17814] Call Trace: [ 1093.553131][T17814] [ 1093.556056][T17814] dump_stack_lvl+0xd6/0x122 [ 1093.560657][T17814] dump_stack+0x11/0x1b [ 1093.564871][T17814] should_fail+0x23c/0x250 [ 1093.569350][T17814] ? kcalloc+0x32/0x50 [ 1093.573417][T17814] __should_failslab+0x81/0x90 [ 1093.578186][T17814] should_failslab+0x5/0x20 [ 1093.582689][T17814] __kmalloc+0x6f/0x370 [ 1093.586866][T17814] ? mark_page_accessed+0x37/0x50 [ 1093.591894][T17814] ? __find_get_block+0x785/0x9b0 [ 1093.596916][T17814] kcalloc+0x32/0x50 [ 1093.600889][T17814] ext4_find_extent+0x1d5/0x660 [ 1093.605874][T17814] ext4_ext_map_blocks+0xee/0x1940 [ 1093.610981][T17814] ? _raw_read_unlock+0x13/0x30 [ 1093.615890][T17814] ext4_map_blocks+0x183/0xb90 [ 1093.620738][T17814] ext4_getblk+0xa4/0x340 [ 1093.625072][T17814] ext4_bread+0x28/0xf0 [ 1093.629230][T17814] ext4_append+0x89/0x140 [ 1093.633560][T17814] ? ext4_init_new_dir+0xb9/0x390 [ 1093.638651][T17814] ext4_init_new_dir+0x12a/0x390 [ 1093.643592][T17814] ext4_mkdir+0x251/0x620 [ 1093.647969][T17814] vfs_mkdir+0x216/0x320 [ 1093.652320][T17814] do_mkdirat+0x12e/0x2c0 [ 1093.656703][T17814] __x64_sys_mkdir+0x40/0x50 [ 1093.661332][T17814] do_syscall_64+0x44/0xd0 [ 1093.665745][T17814] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.671649][T17814] RIP: 0033:0x7f533ffa3157 [ 1093.676177][T17814] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1093.695957][T17814] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1093.704372][T17814] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1093.712352][T17814] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1093.720318][T17814] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 12:55:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x8001, @empty, 0x8000}}, 0xac3b, 0xb1}, 0x90) 12:55:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x13) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0xfffd, @remote}, @in6={0xa, 0x4e23, 0x0, @private0, 0xef}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x400, "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", 0x0, 0x0, 0x0, 0xf8}, r2}}, 0x128) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8001, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) (async) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = fcntl$dupfd(r3, 0x0, r3) fcntl$dupfd(r5, 0x0, r6) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x111, 0x9}}, 0x20) [ 1093.728283][T17814] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1093.736246][T17814] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1093.744218][T17814] [ 1093.760135][T17814] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:55:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x600000000000000) 12:55:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x8001, @empty, 0x8000}}, 0xac3b, 0xb1}, 0x90) 12:55:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x13) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0xfffd, @remote}, @in6={0xa, 0x4e23, 0x0, @private0, 0xef}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x400, "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", 0x0, 0x0, 0x0, 0xf8}, r2}}, 0x128) (async) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8001, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) (async) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) (async) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) (async) r6 = fcntl$dupfd(r3, 0x0, r3) fcntl$dupfd(r5, 0x0, r6) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x111, 0x9}}, 0x20) [ 1093.792041][T17816] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1093.821925][T17814] EXT4-fs (loop4): get root inode failed [ 1093.827592][T17814] EXT4-fs (loop4): mount failed [ 1093.833251][T17832] loop2: detected capacity change from 0 to 545 12:55:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x8001, @empty, 0x8000}}, 0xac3b, 0xb1}, 0x90) 12:55:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x22000000) [ 1093.874659][T17832] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1093.941440][T17848] loop5: detected capacity change from 0 to 545 [ 1093.950469][T17848] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:43 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x2000000}, 0x1c) 12:55:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 55) 12:55:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffff, 0x380080, @dev={0xfe, 0x80, '\x00', 0xd}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e1f, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x101}, {0xa, 0x4e22, 0x0, @private2, 0x80000001}, 0x8000, [0x7, 0x6, 0x80, 0x1, 0x4, 0x101, 0x53, 0x7fffffff]}, 0x5c) 12:55:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x604000000000000) 12:55:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x23000000) [ 1094.355449][T17854] loop4: detected capacity change from 0 to 545 [ 1094.357935][T17856] loop2: detected capacity change from 0 to 545 [ 1094.363587][T17857] loop5: detected capacity change from 0 to 545 [ 1094.379235][T17854] FAULT_INJECTION: forcing a failure. [ 1094.379235][T17854] name failslab, interval 1, probability 0, space 0, times 0 [ 1094.382826][T17856] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1094.391877][T17854] CPU: 0 PID: 17854 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1094.411338][T17854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.421386][T17854] Call Trace: [ 1094.424666][T17854] [ 1094.427598][T17854] dump_stack_lvl+0xd6/0x122 [ 1094.432316][T17854] dump_stack+0x11/0x1b [ 1094.436477][T17854] should_fail+0x23c/0x250 [ 1094.440996][T17854] ? kcalloc+0x32/0x50 [ 1094.445066][T17854] __should_failslab+0x81/0x90 [ 1094.449836][T17854] should_failslab+0x5/0x20 12:55:43 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffff, 0x380080, @dev={0xfe, 0x80, '\x00', 0xd}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e1f, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x101}, {0xa, 0x4e22, 0x0, @private2, 0x80000001}, 0x8000, [0x7, 0x6, 0x80, 0x1, 0x4, 0x101, 0x53, 0x7fffffff]}, 0x5c) [ 1094.454463][T17854] __kmalloc+0x6f/0x370 [ 1094.458630][T17854] kcalloc+0x32/0x50 [ 1094.462526][T17854] ext4_find_extent+0x1d5/0x660 [ 1094.467381][T17854] ext4_ext_map_blocks+0xee/0x1940 [ 1094.472612][T17854] ext4_map_blocks+0x55e/0xb90 [ 1094.477386][T17854] ext4_getblk+0xa4/0x340 [ 1094.481784][T17854] ext4_bread+0x28/0xf0 [ 1094.486012][T17854] ext4_append+0x89/0x140 [ 1094.490332][T17854] ? ext4_init_new_dir+0xb9/0x390 [ 1094.495363][T17854] ext4_init_new_dir+0x12a/0x390 [ 1094.500355][T17854] ext4_mkdir+0x251/0x620 [ 1094.504672][T17854] vfs_mkdir+0x216/0x320 [ 1094.508900][T17854] do_mkdirat+0x12e/0x2c0 [ 1094.513314][T17854] __x64_sys_mkdir+0x40/0x50 [ 1094.517969][T17854] do_syscall_64+0x44/0xd0 [ 1094.522451][T17854] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.528384][T17854] RIP: 0033:0x7f533ffa3157 [ 1094.532903][T17854] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 12:55:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffff, 0x380080, @dev={0xfe, 0x80, '\x00', 0xd}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e1f, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x101}, {0xa, 0x4e22, 0x0, @private2, 0x80000001}, 0x8000, [0x7, 0x6, 0x80, 0x1, 0x4, 0x101, 0x53, 0x7fffffff]}, 0x5c) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0xffff, 0x380080, @dev={0xfe, 0x80, '\x00', 0xd}}, 0x1c) (async) syz_open_procfs(0x0, &(0x7f0000000040)='net/wireless\x00') (async) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e1f, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x101}, {0xa, 0x4e22, 0x0, @private2, 0x80000001}, 0x8000, [0x7, 0x6, 0x80, 0x1, 0x4, 0x101, 0x53, 0x7fffffff]}, 0x5c) (async) [ 1094.552588][T17854] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1094.561060][T17854] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1094.569027][T17854] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1094.576998][T17854] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1094.585013][T17854] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1094.592968][T17854] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1094.600968][T17854] 12:55:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @remote, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380083, @loopback}, 0x1c) 12:55:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f000000) [ 1094.619298][T17857] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:55:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @remote, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380083, @loopback}, 0x1c) 12:55:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x700000000000000) 12:55:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1094.676685][T17874] loop5: detected capacity change from 0 to 545 [ 1094.686971][T17874] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1094.717605][T17879] loop2: detected capacity change from 0 to 545 [ 1094.747107][T17879] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:44 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x3000000}, 0x1c) 12:55:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 56) 12:55:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000000) 12:55:44 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @remote, 0x5}, 0x1c) (async, rerun: 32) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380083, @loopback}, 0x1c) 12:55:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x7}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 12:55:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x800000000000000) [ 1095.226948][T17887] loop5: detected capacity change from 0 to 545 [ 1095.231800][T17891] loop2: detected capacity change from 0 to 545 [ 1095.242325][T17894] loop4: detected capacity change from 0 to 545 [ 1095.248749][T17887] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1095.255348][T17894] FAULT_INJECTION: forcing a failure. [ 1095.255348][T17894] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.269846][T17894] CPU: 1 PID: 17894 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1095.280856][T17894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.290911][T17894] Call Trace: [ 1095.294182][T17894] [ 1095.297105][T17894] dump_stack_lvl+0xd6/0x122 [ 1095.301756][T17894] dump_stack+0x11/0x1b [ 1095.305913][T17894] should_fail+0x23c/0x250 [ 1095.310375][T17894] ? ext4_mb_new_blocks+0x4da/0x1520 [ 1095.315735][T17894] __should_failslab+0x81/0x90 [ 1095.320533][T17894] should_failslab+0x5/0x20 [ 1095.325110][T17894] kmem_cache_alloc+0x4f/0x320 [ 1095.329942][T17894] ext4_mb_new_blocks+0x4da/0x1520 [ 1095.335135][T17894] ? kcalloc+0x32/0x50 [ 1095.339265][T17894] ? ext4_ext_search_right+0x22c/0x400 [ 1095.344749][T17894] ? ext4_inode_to_goal_block+0x13a/0x150 [ 1095.350470][T17894] ext4_ext_map_blocks+0x1107/0x1940 [ 1095.355807][T17894] ext4_map_blocks+0x55e/0xb90 [ 1095.360576][T17894] ext4_getblk+0xa4/0x340 [ 1095.364940][T17894] ext4_bread+0x28/0xf0 [ 1095.369219][T17894] ext4_append+0x89/0x140 [ 1095.373545][T17894] ? ext4_init_new_dir+0xb9/0x390 [ 1095.378618][T17894] ext4_init_new_dir+0x12a/0x390 [ 1095.383559][T17894] ext4_mkdir+0x251/0x620 [ 1095.387896][T17894] vfs_mkdir+0x216/0x320 [ 1095.392140][T17894] do_mkdirat+0x12e/0x2c0 [ 1095.396511][T17894] __x64_sys_mkdir+0x40/0x50 [ 1095.401163][T17894] do_syscall_64+0x44/0xd0 [ 1095.405577][T17894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.411481][T17894] RIP: 0033:0x7f533ffa3157 [ 1095.415896][T17894] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1095.435501][T17894] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1095.443909][T17894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1095.451875][T17894] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1095.459915][T17894] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1095.467968][T17894] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:55:45 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000800) 12:55:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f00000002c0)=0x6, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0x2b, 0x0, 0x100, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8, 0x1, 0x6, 0x3}}) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0xffff, 0xe36f, &(0x7f0000000200)="d857a97d57c05e193b20b03fd0935d6c9ada0c69e8cbd52b044fd42ab567816e96c8f98111a2c48e18c04fbe79785671eb3e010158140c71dbd15292ad98427e2f8e5f966fefdd59d3129369f6c7a2d39a3b1ab38301392855ff202888f510e974da4c995699b4862bbee0b09f4ec56733e44be1d7a4b2f4000005b1f6562a3aa071816912f27d32ea5a4a"}) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r4}, 0x14) 12:55:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x900000000000000) [ 1095.475941][T17894] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1095.483913][T17894] [ 1095.514099][T17891] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 57) 12:55:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x4, 0x2, {}, 0x0, 0x9}}}, 0x118) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x10040, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1095.538619][T17911] loop5: detected capacity change from 0 to 545 [ 1095.553510][T17914] loop4: detected capacity change from 0 to 545 [ 1095.553939][T17911] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1095.564528][T17914] FAULT_INJECTION: forcing a failure. [ 1095.564528][T17914] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.580810][T17914] CPU: 0 PID: 17914 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1095.591824][T17914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.601875][T17914] Call Trace: [ 1095.605145][T17914] [ 1095.608080][T17914] dump_stack_lvl+0xd6/0x122 [ 1095.612689][T17914] dump_stack+0x11/0x1b [ 1095.616885][T17914] should_fail+0x23c/0x250 [ 1095.621312][T17914] ? __es_insert_extent+0x43d/0xac0 [ 1095.626511][T17914] __should_failslab+0x81/0x90 [ 1095.631323][T17914] should_failslab+0x5/0x20 [ 1095.635828][T17914] kmem_cache_alloc+0x4f/0x320 [ 1095.640625][T17914] __es_insert_extent+0x43d/0xac0 [ 1095.645652][T17914] ext4_es_insert_extent+0x1bb/0x15c0 [ 1095.651129][T17914] ext4_map_blocks+0x80a/0xb90 [ 1095.655907][T17914] ext4_getblk+0xa4/0x340 [ 1095.660269][T17914] ext4_bread+0x28/0xf0 [ 1095.664569][T17914] ext4_append+0x89/0x140 [ 1095.668898][T17914] ? ext4_init_new_dir+0xb9/0x390 [ 1095.673954][T17914] ext4_init_new_dir+0x12a/0x390 [ 1095.678895][T17914] ext4_mkdir+0x251/0x620 [ 1095.683247][T17914] vfs_mkdir+0x216/0x320 [ 1095.687492][T17914] do_mkdirat+0x12e/0x2c0 [ 1095.691824][T17914] __x64_sys_mkdir+0x40/0x50 [ 1095.696415][T17914] do_syscall_64+0x44/0xd0 [ 1095.700848][T17914] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.706751][T17914] RIP: 0033:0x7f533ffa3157 [ 1095.711187][T17914] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1095.730794][T17914] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1095.739205][T17914] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1095.747231][T17914] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1095.755198][T17914] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1095.763168][T17914] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1095.771142][T17914] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1095.779163][T17914] [ 1095.786150][T17914] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1095.798004][T17914] EXT4-fs (loop4): get root inode failed [ 1095.803653][T17914] EXT4-fs (loop4): mount failed [ 1095.819506][T17920] loop2: detected capacity change from 0 to 545 [ 1095.828641][T17920] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:45 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x4000000}, 0x1c) 12:55:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x4, 0x2, {}, 0x0, 0x9}}}, 0x118) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x10040, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x4, 0x2, {}, 0x0, 0x9}}}, 0x118) (async) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x10040, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 12:55:45 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x44000000) 12:55:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 58) 12:55:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xa00000000000000) 12:55:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f00000002c0)=0x6, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0x2b, 0x0, 0x100, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8, 0x1, 0x6, 0x3}}) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0xffff, 0xe36f, &(0x7f0000000200)="d857a97d57c05e193b20b03fd0935d6c9ada0c69e8cbd52b044fd42ab567816e96c8f98111a2c48e18c04fbe79785671eb3e010158140c71dbd15292ad98427e2f8e5f966fefdd59d3129369f6c7a2d39a3b1ab38301392855ff202888f510e974da4c995699b4862bbee0b09f4ec56733e44be1d7a4b2f4000005b1f6562a3aa071816912f27d32ea5a4a"}) (async) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r4}, 0x14) 12:55:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x4, 0x2, {}, 0x0, 0x9}}}, 0x118) (async) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x10040, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1096.352604][T17931] loop5: detected capacity change from 0 to 545 [ 1096.359409][T17934] loop2: detected capacity change from 0 to 545 [ 1096.366439][T17932] loop4: detected capacity change from 0 to 545 [ 1096.386409][T17931] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1096.394961][T17932] FAULT_INJECTION: forcing a failure. [ 1096.394961][T17932] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.407629][T17932] CPU: 1 PID: 17932 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1096.418643][T17932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.428828][T17932] Call Trace: [ 1096.432172][T17932] [ 1096.435104][T17932] dump_stack_lvl+0xd6/0x122 [ 1096.439747][T17932] dump_stack+0x11/0x1b [ 1096.443949][T17932] should_fail+0x23c/0x250 [ 1096.448363][T17932] ? jbd2_journal_add_journal_head+0x49/0x300 [ 1096.454545][T17932] __should_failslab+0x81/0x90 [ 1096.459373][T17932] should_failslab+0x5/0x20 [ 1096.463953][T17932] kmem_cache_alloc+0x4f/0x320 [ 1096.468726][T17932] jbd2_journal_add_journal_head+0x49/0x300 [ 1096.474658][T17932] jbd2_journal_get_create_access+0x25/0x1e0 [ 1096.480679][T17932] __ext4_journal_get_create_access+0x62/0x270 [ 1096.486845][T17932] ext4_getblk+0x1b9/0x340 [ 1096.491269][T17932] ext4_bread+0x28/0xf0 [ 1096.495502][T17932] ext4_append+0x89/0x140 [ 1096.499863][T17932] ? ext4_init_new_dir+0xb9/0x390 [ 1096.504888][T17932] ext4_init_new_dir+0x12a/0x390 [ 1096.509825][T17932] ext4_mkdir+0x251/0x620 [ 1096.514211][T17932] vfs_mkdir+0x216/0x320 [ 1096.518464][T17932] do_mkdirat+0x12e/0x2c0 [ 1096.522824][T17932] __x64_sys_mkdir+0x40/0x50 [ 1096.527429][T17932] do_syscall_64+0x44/0xd0 [ 1096.531843][T17932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.537738][T17932] RIP: 0033:0x7f533ffa3157 [ 1096.542295][T17932] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1096.561938][T17932] RSP: 002b:00007f533f119f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1096.570415][T17932] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa3157 [ 1096.578385][T17932] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1096.586352][T17932] RBP: 00007f533f11a020 R08: 0000000000000000 R09: 00007f533f11a1d0 [ 1096.594341][T17932] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:55:46 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x48000000) 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1096.602367][T17932] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1096.610436][T17932] [ 1096.613630][T17932] ENOMEM in journal_alloc_journal_head, retrying. [ 1096.631974][T17932] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1096.637856][T17934] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xb00000000000000) 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1096.659485][T17932] EXT4-fs (loop4): get root inode failed [ 1096.665241][T17932] EXT4-fs (loop4): mount failed [ 1096.698175][T17960] loop5: detected capacity change from 0 to 545 [ 1096.716156][T17965] loop2: detected capacity change from 0 to 545 12:55:46 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x5000000}, 0x1c) 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) 12:55:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 59) 12:55:46 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4c000000) 12:55:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc00000000000000) 12:55:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) setsockopt$inet6_int(r2, 0x29, 0x38, &(0x7f00000002c0)=0x6, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x2f, 0x2b, 0x0, 0x100, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8, 0x1, 0x6, 0x3}}) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000180)=@usbdevfs_driver={0xffff, 0xe36f, &(0x7f0000000200)="d857a97d57c05e193b20b03fd0935d6c9ada0c69e8cbd52b044fd42ab567816e96c8f98111a2c48e18c04fbe79785671eb3e010158140c71dbd15292ad98427e2f8e5f966fefdd59d3129369f6c7a2d39a3b1ab38301392855ff202888f510e974da4c995699b4862bbee0b09f4ec56733e44be1d7a4b2f4000005b1f6562a3aa071816912f27d32ea5a4a"}) (async) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000140)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r4}, 0x14) 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) [ 1097.226800][T17972] loop5: detected capacity change from 0 to 545 [ 1097.228813][T17974] loop2: detected capacity change from 0 to 545 [ 1097.234008][T17973] loop4: detected capacity change from 0 to 545 [ 1097.263286][T17973] FAULT_INJECTION: forcing a failure. [ 1097.263286][T17973] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.276168][T17973] CPU: 1 PID: 17973 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1097.287196][T17973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.297249][T17973] Call Trace: [ 1097.300528][T17973] [ 1097.303451][T17973] dump_stack_lvl+0xd6/0x122 [ 1097.308126][T17973] dump_stack+0x11/0x1b [ 1097.312287][T17973] should_fail+0x23c/0x250 [ 1097.316722][T17973] ? strndup_user+0x64/0xa0 [ 1097.321226][T17973] __should_failslab+0x81/0x90 [ 1097.325995][T17973] should_failslab+0x5/0x20 [ 1097.330506][T17973] __kmalloc_track_caller+0x6d/0x370 [ 1097.335842][T17973] memdup_user+0x22/0xb0 [ 1097.340083][T17973] strndup_user+0x64/0xa0 [ 1097.344464][T17973] __se_sys_mount+0x4e/0x2f0 [ 1097.349051][T17973] ? debug_smp_processor_id+0x18/0x20 [ 1097.354424][T17973] __x64_sys_mount+0x63/0x70 [ 1097.359098][T17973] do_syscall_64+0x44/0xd0 [ 1097.363514][T17973] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.369477][T17973] RIP: 0033:0x7f533ffa557a [ 1097.373883][T17973] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1097.393494][T17973] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1097.401931][T17973] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1097.409894][T17973] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1097.417859][T17973] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) 12:55:46 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x68000000) 12:55:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xd00000000000000) 12:55:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x41}, 0x3675444b}, {0xa, 0x4e24, 0x80, @mcast2, 0x8000}, r1, 0x3f}}, 0x48) [ 1097.425925][T17973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1097.433969][T17973] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1097.441947][T17973] 12:55:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 60) [ 1097.503693][T17996] loop4: detected capacity change from 0 to 545 [ 1097.510627][T17996] FAULT_INJECTION: forcing a failure. [ 1097.510627][T17996] name failslab, interval 1, probability 0, space 0, times 0 [ 1097.523328][T17996] CPU: 0 PID: 17996 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1097.534367][T17996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.544455][T17996] Call Trace: [ 1097.547731][T17996] [ 1097.550656][T17996] dump_stack_lvl+0xd6/0x122 [ 1097.555386][T17996] dump_stack+0x11/0x1b [ 1097.559600][T17996] should_fail+0x23c/0x250 [ 1097.562980][T18000] loop2: detected capacity change from 0 to 545 [ 1097.564020][T17996] ? strndup_user+0x64/0xa0 [ 1097.574738][T17996] __should_failslab+0x81/0x90 [ 1097.579583][T17996] should_failslab+0x5/0x20 [ 1097.584143][T17996] __kmalloc_track_caller+0x6d/0x370 [ 1097.589501][T17996] memdup_user+0x22/0xb0 [ 1097.593764][T17996] strndup_user+0x64/0xa0 [ 1097.598084][T17996] __se_sys_mount+0x4e/0x2f0 [ 1097.602725][T17996] ? debug_smp_processor_id+0x18/0x20 [ 1097.608162][T17996] __x64_sys_mount+0x63/0x70 [ 1097.612735][T17996] do_syscall_64+0x44/0xd0 [ 1097.617216][T17996] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.623128][T17996] RIP: 0033:0x7f533ffa557a [ 1097.627566][T17996] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1097.647158][T17996] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1097.655582][T17996] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1097.663549][T17996] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1097.671567][T17996] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1097.679602][T17996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1097.687562][T17996] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1097.695585][T17996] [ 1097.699246][T17999] loop5: detected capacity change from 0 to 545 12:55:47 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x6000000}, 0x1c) 12:55:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6c000000) 12:55:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x41}, 0x3675444b}, {0xa, 0x4e24, 0x80, @mcast2, 0x8000}, r1, 0x3f}}, 0x48) 12:55:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 61) 12:55:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xe00000000000000) 12:55:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x400, 0x380082, @empty, 0xffffffff}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000180)=""/18, 0x12}], 0x6, &(0x7f0000000400)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}, 0x2160) [ 1098.096950][T18013] loop4: detected capacity change from 0 to 545 [ 1098.097333][T18014] loop2: detected capacity change from 0 to 545 [ 1098.104700][T18015] loop5: detected capacity change from 0 to 545 [ 1098.127647][T18013] FAULT_INJECTION: forcing a failure. [ 1098.127647][T18013] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.140400][T18013] CPU: 1 PID: 18013 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1098.151420][T18013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.161479][T18013] Call Trace: [ 1098.164758][T18013] [ 1098.167734][T18013] dump_stack_lvl+0xd6/0x122 [ 1098.172329][T18013] dump_stack+0x11/0x1b [ 1098.176490][T18013] should_fail+0x23c/0x250 [ 1098.180907][T18013] ? strndup_user+0x64/0xa0 [ 1098.185460][T18013] __should_failslab+0x81/0x90 [ 1098.190224][T18013] should_failslab+0x5/0x20 [ 1098.194798][T18013] __kmalloc_track_caller+0x6d/0x370 [ 1098.200090][T18013] memdup_user+0x22/0xb0 [ 1098.204390][T18013] strndup_user+0x64/0xa0 [ 1098.208732][T18013] __se_sys_mount+0x4e/0x2f0 [ 1098.213346][T18013] ? debug_smp_processor_id+0x18/0x20 [ 1098.218721][T18013] __x64_sys_mount+0x63/0x70 [ 1098.223353][T18013] do_syscall_64+0x44/0xd0 [ 1098.227769][T18013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.233666][T18013] RIP: 0033:0x7f533ffa557a [ 1098.238150][T18013] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1098.257765][T18013] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.266178][T18013] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1098.274151][T18013] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1098.282121][T18013] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 12:55:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x400, 0x380082, @empty, 0xffffffff}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000180)=""/18, 0x12}], 0x6, &(0x7f0000000400)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}, 0x2160) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x400, 0x380082, @empty, 0xffffffff}, 0x1c) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000180)=""/18, 0x12}], 0x6, &(0x7f0000000400)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}, 0x2160) (async) 12:55:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x41}, 0x3675444b}, {0xa, 0x4e24, 0x80, @mcast2, 0x8000}, r1, 0x3f}}, 0x48) 12:55:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x400, 0x380082, @empty, 0xffffffff}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000180)=""/18, 0x12}], 0x6, &(0x7f0000000400)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}, 0x2160) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x400, 0x380082, @empty, 0xffffffff}, 0x1c) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000180)=""/18, 0x12}], 0x6, &(0x7f0000000400)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x158}, 0x2160) (async) 12:55:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x74000000) [ 1098.290087][T18013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1098.298052][T18013] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1098.306128][T18013] 12:55:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf00000000000000) 12:55:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 62) 12:55:47 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x2e, 0xa, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7ff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x40380080, @empty}, 0x1c) [ 1098.377026][T18038] loop2: detected capacity change from 0 to 545 [ 1098.389242][T18040] loop4: detected capacity change from 0 to 545 [ 1098.397316][T18042] loop5: detected capacity change from 0 to 545 [ 1098.404113][T18044] 9pnet_fd: Insufficient options for proto=fd [ 1098.409579][T18040] FAULT_INJECTION: forcing a failure. [ 1098.409579][T18040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1098.423402][T18040] CPU: 1 PID: 18040 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1098.434553][T18040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.444607][T18040] Call Trace: [ 1098.447951][T18040] [ 1098.450885][T18040] dump_stack_lvl+0xd6/0x122 [ 1098.455473][T18040] dump_stack+0x11/0x1b [ 1098.459652][T18040] should_fail+0x23c/0x250 [ 1098.464060][T18040] should_fail_usercopy+0x16/0x20 [ 1098.469070][T18040] _copy_from_user+0x1c/0xd0 [ 1098.473680][T18040] memdup_user+0x5b/0xb0 [ 1098.477919][T18040] strndup_user+0x64/0xa0 [ 1098.482234][T18040] __se_sys_mount+0x91/0x2f0 [ 1098.486845][T18040] ? debug_smp_processor_id+0x18/0x20 [ 1098.492211][T18040] __x64_sys_mount+0x63/0x70 [ 1098.496841][T18040] do_syscall_64+0x44/0xd0 [ 1098.501243][T18040] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.507128][T18040] RIP: 0033:0x7f533ffa557a [ 1098.511526][T18040] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1098.531116][T18040] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1098.539521][T18040] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1098.547477][T18040] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1098.555506][T18040] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1098.563463][T18040] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1098.571417][T18040] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1098.579374][T18040] 12:55:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7a000000) 12:55:48 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x7000000}, 0x1c) 12:55:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x2e, 0xa, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7ff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x40380080, @empty}, 0x1c) 12:55:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000000) 12:55:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r3, 0x13}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0x1}}}, 0x118) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000880)) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r7, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000940)={0xf, 0x8, 0xfa00, {r7, 0xc}}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000005c0)="c91d07eec021f4b5a251b7cbe3d3b098a91486f43bebdbb2955c74d1943b4c8a547643ee27b3e2c493eadd453a0d2e1f7e850f1e1dad0ad93ae451f0279de1f32b651236f61a4971281aef885f47b2e920bd5fbace1dee13d496eb89bb6a3f0907f8bebc356b0bf562d87bbee7721d87d5fb44aaebaa503099836bab3976da081b0d78431ab4fd7d005b49981421e6af0769e556", 0x94}, {&(0x7f0000000680)="472d229412014e432f088a1a2f92d5811af4886817abef44163dc19daeb6f0a8d7d1f98931eadf459f023faff8576d4742fd6a4a1e59a608a13a1b5f217b20f479f21dcbdaeb9f7e5f5bcce9e27ac4feb021603faa5c063322eb548be18cb8f2e77334a8e8b032234c011fc3ba20b4dd8a6bab881b19d2b518b87201000e3bb1435b17374627240c27b06c2c38473bb4d19b0a7500e5714696851ba98af7f86b19eaa77de8975392d1b12eaea3d7efa5c9a1", 0xb2}, {&(0x7f0000000980)="03a35db4ea9d6381d1719443e71d3ac3dc3a1038a1aaba0bc4137a6350db830123d1a51cb23bd51b1ecf70567e3013d93ac91b69b36101703118a428b3044c56d5f18fddc9d7b43d85faf7510d668915e258a19c28441fe9d176c590fb5dea6be94101b4dd8462196deb745c13d316b55e8eb0aad543477c8f30951d2859d96d54708bc589a5910ea7028ee6eb54bca9530ea4cf05de3297577f20e8f8a74604598c698f60ba62e89ea53dbf4f1a0d", 0xaf}, {&(0x7f0000000800)="42df8788c1c475fef8063228e65ff7c15c92822b3533b235a686540247d51752a7eb90504a99f43a43cd1091b1f50d09591cd165183a1f54b448109c670b6959b8abee8ae8225db24e2463b3464261f88e030970ef41edf8938da0a2b07160b12c2ccb3826d1f28b24a3", 0x6a}], 0x4, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x20, 0x4000000}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r8, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r8, 0x4a, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1ff}}}, 0x118) 12:55:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 63) 12:55:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r3, 0x13}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0x1}}}, 0x118) (async, rerun: 64) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x2}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async, rerun: 64) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000880)) (async, rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r7, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000940)={0xf, 0x8, 0xfa00, {r7, 0xc}}, 0x10) (async, rerun: 64) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000005c0)="c91d07eec021f4b5a251b7cbe3d3b098a91486f43bebdbb2955c74d1943b4c8a547643ee27b3e2c493eadd453a0d2e1f7e850f1e1dad0ad93ae451f0279de1f32b651236f61a4971281aef885f47b2e920bd5fbace1dee13d496eb89bb6a3f0907f8bebc356b0bf562d87bbee7721d87d5fb44aaebaa503099836bab3976da081b0d78431ab4fd7d005b49981421e6af0769e556", 0x94}, {&(0x7f0000000680)="472d229412014e432f088a1a2f92d5811af4886817abef44163dc19daeb6f0a8d7d1f98931eadf459f023faff8576d4742fd6a4a1e59a608a13a1b5f217b20f479f21dcbdaeb9f7e5f5bcce9e27ac4feb021603faa5c063322eb548be18cb8f2e77334a8e8b032234c011fc3ba20b4dd8a6bab881b19d2b518b87201000e3bb1435b17374627240c27b06c2c38473bb4d19b0a7500e5714696851ba98af7f86b19eaa77de8975392d1b12eaea3d7efa5c9a1", 0xb2}, {&(0x7f0000000980)="03a35db4ea9d6381d1719443e71d3ac3dc3a1038a1aaba0bc4137a6350db830123d1a51cb23bd51b1ecf70567e3013d93ac91b69b36101703118a428b3044c56d5f18fddc9d7b43d85faf7510d668915e258a19c28441fe9d176c590fb5dea6be94101b4dd8462196deb745c13d316b55e8eb0aad543477c8f30951d2859d96d54708bc589a5910ea7028ee6eb54bca9530ea4cf05de3297577f20e8f8a74604598c698f60ba62e89ea53dbf4f1a0d", 0xaf}, {&(0x7f0000000800)="42df8788c1c475fef8063228e65ff7c15c92822b3533b235a686540247d51752a7eb90504a99f43a43cd1091b1f50d09591cd165183a1f54b448109c670b6959b8abee8ae8225db24e2463b3464261f88e030970ef41edf8938da0a2b07160b12c2ccb3826d1f28b24a3", 0x6a}], 0x4, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x20, 0x4000000}, 0x14) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r8, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r8, 0x4a, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1ff}}}, 0x118) [ 1099.163030][T18058] loop4: detected capacity change from 0 to 545 [ 1099.163858][T18059] loop5: detected capacity change from 0 to 545 [ 1099.176691][T18057] loop2: detected capacity change from 0 to 545 [ 1099.183144][T18054] 9pnet_fd: Insufficient options for proto=fd [ 1099.199091][T18058] FAULT_INJECTION: forcing a failure. [ 1099.199091][T18058] name fail_usercopy, interval 1, probability 0, space 0, times 0 12:55:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x2e, 0xa, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7ff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x40380080, @empty}, 0x1c) [ 1099.212234][T18058] CPU: 0 PID: 18058 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1099.223259][T18058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.233309][T18058] Call Trace: [ 1099.236578][T18058] [ 1099.239509][T18058] dump_stack_lvl+0xd6/0x122 [ 1099.244104][T18058] dump_stack+0x11/0x1b [ 1099.248301][T18058] should_fail+0x23c/0x250 [ 1099.252119][T18076] 9pnet_fd: Insufficient options for proto=fd 12:55:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x8cffffff) 12:55:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r3, 0x13}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0x1}}}, 0x118) (async, rerun: 32) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x2}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async, rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000880)) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r7, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000940)={0xf, 0x8, 0xfa00, {r7, 0xc}}, 0x10) (async, rerun: 64) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000005c0)="c91d07eec021f4b5a251b7cbe3d3b098a91486f43bebdbb2955c74d1943b4c8a547643ee27b3e2c493eadd453a0d2e1f7e850f1e1dad0ad93ae451f0279de1f32b651236f61a4971281aef885f47b2e920bd5fbace1dee13d496eb89bb6a3f0907f8bebc356b0bf562d87bbee7721d87d5fb44aaebaa503099836bab3976da081b0d78431ab4fd7d005b49981421e6af0769e556", 0x94}, {&(0x7f0000000680)="472d229412014e432f088a1a2f92d5811af4886817abef44163dc19daeb6f0a8d7d1f98931eadf459f023faff8576d4742fd6a4a1e59a608a13a1b5f217b20f479f21dcbdaeb9f7e5f5bcce9e27ac4feb021603faa5c063322eb548be18cb8f2e77334a8e8b032234c011fc3ba20b4dd8a6bab881b19d2b518b87201000e3bb1435b17374627240c27b06c2c38473bb4d19b0a7500e5714696851ba98af7f86b19eaa77de8975392d1b12eaea3d7efa5c9a1", 0xb2}, {&(0x7f0000000980)="03a35db4ea9d6381d1719443e71d3ac3dc3a1038a1aaba0bc4137a6350db830123d1a51cb23bd51b1ecf70567e3013d93ac91b69b36101703118a428b3044c56d5f18fddc9d7b43d85faf7510d668915e258a19c28441fe9d176c590fb5dea6be94101b4dd8462196deb745c13d316b55e8eb0aad543477c8f30951d2859d96d54708bc589a5910ea7028ee6eb54bca9530ea4cf05de3297577f20e8f8a74604598c698f60ba62e89ea53dbf4f1a0d", 0xaf}, {&(0x7f0000000800)="42df8788c1c475fef8063228e65ff7c15c92822b3533b235a686540247d51752a7eb90504a99f43a43cd1091b1f50d09591cd165183a1f54b448109c670b6959b8abee8ae8225db24e2463b3464261f88e030970ef41edf8938da0a2b07160b12c2ccb3826d1f28b24a3", 0x6a}], 0x4, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}], 0x20, 0x4000000}, 0x14) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r5, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r8, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r8, 0x4a, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1ff}}}, 0x118) (rerun: 64) 12:55:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fcntl$getflags(r0, 0xb) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x380080, @remote}, 0x1c) [ 1099.252716][T18058] should_fail_usercopy+0x16/0x20 [ 1099.263784][T18058] _copy_from_user+0x1c/0xd0 [ 1099.268379][T18058] memdup_user+0x5b/0xb0 [ 1099.272628][T18058] strndup_user+0x64/0xa0 [ 1099.277034][T18058] __se_sys_mount+0x91/0x2f0 [ 1099.281628][T18058] ? debug_smp_processor_id+0x18/0x20 [ 1099.287007][T18058] __x64_sys_mount+0x63/0x70 [ 1099.291605][T18058] do_syscall_64+0x44/0xd0 [ 1099.296095][T18058] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.302076][T18058] RIP: 0033:0x7f533ffa557a 12:55:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x84, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x0, @private2={0xfc, 0x2, '\x00', 0xfe}, 0x8000001}, @in6={0xa, 0x4e24, 0x4, @private1, 0x8000}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x5, 0x0, 0x1}, r1}}, 0x128) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000000c0)) 12:55:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x84, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x0, @private2={0xfc, 0x2, '\x00', 0xfe}, 0x8000001}, @in6={0xa, 0x4e24, 0x4, @private1, 0x8000}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x5, 0x0, 0x1}, r1}}, 0x128) (async, rerun: 32) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000000c0)) [ 1099.306485][T18058] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1099.326106][T18058] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1099.334520][T18058] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1099.342491][T18058] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1099.350467][T18058] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1099.358470][T18058] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1099.366450][T18058] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1099.375730][T18058] [ 1099.413180][T18094] loop5: detected capacity change from 0 to 545 12:55:49 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x8000000}, 0x1c) 12:55:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x84, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x0, @private2={0xfc, 0x2, '\x00', 0xfe}, 0x8000001}, @in6={0xa, 0x4e24, 0x4, @private1, 0x8000}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x5, 0x0, 0x1}, r1}}, 0x128) (async) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000000c0)) 12:55:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1100000000000000) 12:55:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 64) 12:55:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x97ffffff) 12:55:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) [ 1100.046326][T18100] loop4: detected capacity change from 0 to 545 [ 1100.055217][T18104] loop2: detected capacity change from 0 to 545 [ 1100.055928][T18105] loop5: detected capacity change from 0 to 545 [ 1100.073841][T18100] FAULT_INJECTION: forcing a failure. [ 1100.073841][T18100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1100.086909][T18100] CPU: 0 PID: 18100 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1100.097930][T18100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.107983][T18100] Call Trace: [ 1100.111305][T18100] [ 1100.114225][T18100] dump_stack_lvl+0xd6/0x122 [ 1100.118822][T18100] dump_stack+0x11/0x1b [ 1100.122967][T18100] should_fail+0x23c/0x250 [ 1100.127394][T18100] should_fail_usercopy+0x16/0x20 [ 1100.132468][T18100] _copy_from_user+0x1c/0xd0 [ 1100.137069][T18100] __se_sys_mount+0x119/0x2f0 [ 1100.141735][T18100] __x64_sys_mount+0x63/0x70 [ 1100.146327][T18100] do_syscall_64+0x44/0xd0 [ 1100.150799][T18100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.156677][T18100] RIP: 0033:0x7f533ffa557a [ 1100.161084][T18100] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1100.180692][T18100] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1100.189089][T18100] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a 12:55:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) 12:55:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fcntl$getflags(r0, 0xb) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x380080, @remote}, 0x1c) 12:55:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x9e050000) [ 1100.197051][T18100] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1100.205007][T18100] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1100.213018][T18100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1100.220974][T18100] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1100.228938][T18100] 12:55:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1200000000000000) 12:55:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) 12:55:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x6}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1100.260895][T18100] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1100.277951][T18100] EXT4-fs (loop4): get root inode failed [ 1100.283703][T18100] EXT4-fs (loop4): mount failed [ 1100.327052][T18129] loop5: detected capacity change from 0 to 545 [ 1100.329421][T18131] loop2: detected capacity change from 0 to 545 12:55:50 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x9000000}, 0x1c) 12:55:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x6}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:50 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc4050000) 12:55:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 65) 12:55:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1902000000000000) 12:55:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x6}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (rerun: 32) [ 1100.920085][T18138] loop4: detected capacity change from 0 to 545 [ 1100.923953][T18141] loop5: detected capacity change from 0 to 545 [ 1100.926750][T18140] loop2: detected capacity change from 0 to 545 [ 1100.943165][T18138] FAULT_INJECTION: forcing a failure. [ 1100.943165][T18138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1100.956258][T18138] CPU: 0 PID: 18138 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1100.967279][T18138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.977335][T18138] Call Trace: [ 1100.980633][T18138] [ 1100.983553][T18138] dump_stack_lvl+0xd6/0x122 [ 1100.988226][T18138] dump_stack+0x11/0x1b [ 1100.992385][T18138] should_fail+0x23c/0x250 [ 1100.996808][T18138] should_fail_usercopy+0x16/0x20 [ 1101.001838][T18138] _copy_from_user+0x1c/0xd0 [ 1101.006437][T18138] __se_sys_mount+0x119/0x2f0 [ 1101.011189][T18138] ? debug_smp_processor_id+0x18/0x20 [ 1101.016605][T18138] __x64_sys_mount+0x63/0x70 [ 1101.021195][T18138] do_syscall_64+0x44/0xd0 [ 1101.025611][T18138] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.031572][T18138] RIP: 0033:0x7f533ffa557a [ 1101.035984][T18138] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1101.055604][T18138] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:55:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fcntl$getflags(r0, 0xb) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x380080, @remote}, 0x1c) 12:55:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000000) [ 1101.064022][T18138] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1101.072004][T18138] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1101.079972][T18138] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1101.088025][T18138] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1101.095993][T18138] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1101.103968][T18138] 12:55:50 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf4ffffff) 12:55:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0xffffffffffffff00, 0x101000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in6={0xa, 0x4e1e, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x401}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1101.153599][T18138] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1101.177407][T18138] EXT4-fs (loop4): get root inode failed [ 1101.183116][T18138] EXT4-fs (loop4): mount failed 12:55:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0xffffffffffffff00, 0x101000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in6={0xa, 0x4e1e, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x401}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0xffffffffffffff00, 0x101000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @in6={0xa, 0x4e1e, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x401}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1101.199415][T18166] loop2: detected capacity change from 0 to 545 [ 1101.241996][T18177] loop5: detected capacity change from 0 to 545 12:55:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0xdbc7, 0x0, 0xffffffffffff0001}}}, 0x118) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0xb4800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x414000, 0x0) fallocate(r3, 0x1e, 0x8, 0xfff) 12:55:51 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf6ffffff) 12:55:51 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xa000000}, 0x1c) 12:55:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2102000000000000) 12:55:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 66) [ 1101.793532][T18183] loop2: detected capacity change from 0 to 545 [ 1101.796567][T18186] loop5: detected capacity change from 0 to 545 [ 1101.800668][T18185] loop4: detected capacity change from 0 to 545 [ 1101.814595][T18185] FAULT_INJECTION: forcing a failure. [ 1101.814595][T18185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1101.827706][T18185] CPU: 0 PID: 18185 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1101.838967][T18185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.849022][T18185] Call Trace: [ 1101.852296][T18185] [ 1101.855219][T18185] dump_stack_lvl+0xd6/0x122 [ 1101.859813][T18185] dump_stack+0x11/0x1b [ 1101.863985][T18185] should_fail+0x23c/0x250 [ 1101.868407][T18185] should_fail_usercopy+0x16/0x20 [ 1101.873508][T18185] strncpy_from_user+0x21/0x250 [ 1101.878432][T18185] getname_flags+0xb8/0x3f0 [ 1101.882942][T18185] ? should_fail+0xd6/0x250 [ 1101.887446][T18185] user_path_at_empty+0x28/0x110 [ 1101.892384][T18185] __se_sys_mount+0x217/0x2f0 [ 1101.897079][T18185] __x64_sys_mount+0x63/0x70 [ 1101.901692][T18185] do_syscall_64+0x44/0xd0 [ 1101.906169][T18185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.912068][T18185] RIP: 0033:0x7f533ffa557a [ 1101.916476][T18185] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 12:55:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x49, 0x1, 0x8, 0x9, 0x70, 0x40, 0x81, 0x7, 0x1, 0x1, 0xf7, 0x9}, 0xe) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0xdbc7, 0x0, 0xffffffffffff0001}}}, 0x118) (async) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0xb4800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x111, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x414000, 0x0) fallocate(r3, 0x1e, 0x8, 0xfff) 12:55:51 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfbffffff) 12:55:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2200000000000000) [ 1101.936208][T18185] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1101.944617][T18185] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1101.952623][T18185] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1101.960642][T18185] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1101.968642][T18185] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1101.976683][T18185] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1101.984665][T18185] 12:55:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0xdbc7, 0x0, 0xffffffffffff0001}}}, 0x118) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0xb4800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x414000, 0x0) fallocate(r3, 0x1e, 0x8, 0xfff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib={0x1b, 0x0, 0x0, {}, 0xdbc7, 0x0, 0xffffffffffff0001}}}, 0x118) (async) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0xb4800, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x111, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x414000, 0x0) (async) fallocate(r3, 0x1e, 0x8, 0xfff) (async) 12:55:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x49, 0x1, 0x8, 0x9, 0x70, 0x40, 0x81, 0x7, 0x1, 0x1, 0xf7, 0x9}, 0xe) (async, rerun: 32) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x49, 0x1, 0x8, 0x9, 0x70, 0x40, 0x81, 0x7, 0x1, 0x1, 0xf7, 0x9}, 0xe) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x1) (async) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3, 0x49, 0x1, 0x8, 0x9, 0x70, 0x40, 0x81, 0x7, 0x1, 0x1, 0xf7, 0x9}, 0xe) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:55:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r1, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0x2, "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", 0x0, 0xa8, 0x6, 0x7, 0x2, 0x80, 0x8}, r2}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) [ 1102.077368][T18216] loop2: detected capacity change from 0 to 545 [ 1102.077556][T18214] loop5: detected capacity change from 0 to 545 12:55:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xf000000}, 0x1c) 12:55:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 67) 12:55:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r1, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0x2, "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", 0x0, 0xa8, 0x6, 0x7, 0x2, 0x80, 0x8}, r2}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x106, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r1, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0x2, "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", 0x0, 0xa8, 0x6, 0x7, 0x2, 0x80, 0x8}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) (async) 12:55:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x380080, @empty, 0xffffffff}, 0x1c) 12:55:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfdffffff) 12:55:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2300000000000000) 12:55:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r1, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @multicast1}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x3, {0x2, 0x2, "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", 0x0, 0xa8, 0x6, 0x7, 0x2, 0x80, 0x8}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 12:55:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x380080, @empty, 0xffffffff}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x380080, @empty, 0xffffffff}, 0x1c) (async) [ 1102.660763][T18240] loop2: detected capacity change from 0 to 545 [ 1102.660777][T18241] loop5: detected capacity change from 0 to 545 [ 1102.670201][T18228] loop4: detected capacity change from 0 to 545 [ 1102.701213][T18228] FAULT_INJECTION: forcing a failure. [ 1102.701213][T18228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1102.714377][T18228] CPU: 0 PID: 18228 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1102.725611][T18228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.735665][T18228] Call Trace: [ 1102.739020][T18228] [ 1102.741946][T18228] dump_stack_lvl+0xd6/0x122 [ 1102.746622][T18228] dump_stack+0x11/0x1b [ 1102.750797][T18228] should_fail+0x23c/0x250 [ 1102.755287][T18228] should_fail_usercopy+0x16/0x20 [ 1102.760316][T18228] strncpy_from_user+0x21/0x250 [ 1102.765294][T18228] getname_flags+0xb8/0x3f0 [ 1102.769801][T18228] ? should_fail+0xd6/0x250 [ 1102.774305][T18228] user_path_at_empty+0x28/0x110 [ 1102.779244][T18228] __se_sys_mount+0x217/0x2f0 [ 1102.783925][T18228] ? __this_cpu_preempt_check+0x18/0x20 [ 1102.789524][T18228] __x64_sys_mount+0x63/0x70 [ 1102.794121][T18228] do_syscall_64+0x44/0xd0 [ 1102.798541][T18228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.804441][T18228] RIP: 0033:0x7f533ffa557a [ 1102.808854][T18228] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1102.828472][T18228] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1102.836933][T18228] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a 12:55:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfeffffff) 12:55:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x380080, @empty, 0xffffffff}, 0x1c) 12:55:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f00000000000000) 12:55:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1102.844906][T18228] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1102.852969][T18228] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1102.860938][T18228] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1102.868910][T18228] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1102.876883][T18228] [ 1102.948946][T18264] loop2: detected capacity change from 0 to 545 [ 1102.951017][T18262] loop5: detected capacity change from 0 to 545 12:55:53 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x10000120}, 0x1c) 12:55:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x2}}, 0x20) close(r2) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xe2}}, 0x10) 12:55:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 68) 12:55:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xff0f0000) 12:55:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000000) [ 1103.742810][T18277] loop2: detected capacity change from 0 to 545 [ 1103.743174][T18278] loop4: detected capacity change from 0 to 545 [ 1103.756222][T18275] loop5: detected capacity change from 0 to 545 [ 1103.768968][T18278] FAULT_INJECTION: forcing a failure. [ 1103.768968][T18278] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.781697][T18278] CPU: 0 PID: 18278 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1103.792790][T18278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.803771][T18278] Call Trace: [ 1103.807054][T18278] [ 1103.809978][T18278] dump_stack_lvl+0xd6/0x122 [ 1103.814574][T18278] dump_stack+0x11/0x1b [ 1103.818768][T18278] should_fail+0x23c/0x250 [ 1103.823189][T18278] ? ext4_init_fs_context+0x21/0x50 [ 1103.828394][T18278] __should_failslab+0x81/0x90 [ 1103.833160][T18278] should_failslab+0x5/0x20 [ 1103.837665][T18278] kmem_cache_alloc_trace+0x52/0x350 [ 1103.842959][T18278] ? kmem_cache_alloc_trace+0x24b/0x350 [ 1103.848509][T18278] ext4_init_fs_context+0x21/0x50 [ 1103.853584][T18278] alloc_fs_context+0x419/0x500 [ 1103.858504][T18278] fs_context_for_mount+0x1d/0x20 [ 1103.863610][T18278] path_mount+0xdf0/0x1c40 [ 1103.868025][T18278] ? kmem_cache_free+0x65/0x110 [ 1103.872877][T18278] __se_sys_mount+0x24b/0x2f0 [ 1103.877633][T18278] __x64_sys_mount+0x63/0x70 [ 1103.882219][T18278] do_syscall_64+0x44/0xd0 [ 1103.886689][T18278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.892612][T18278] RIP: 0033:0x7f533ffa557a [ 1103.897090][T18278] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1103.916767][T18278] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1103.925190][T18278] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1103.933183][T18278] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 12:55:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x9) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:55:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x2}}, 0x20) (async) close(r2) (async) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xe2}}, 0x10) 12:55:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnexthop={0x2c, 0x6a, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@NHA_FDB={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000804) [ 1103.941148][T18278] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1103.949106][T18278] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1103.957143][T18278] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1103.965114][T18278] 12:55:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffefffff) 12:55:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000080000000000) 12:55:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 69) [ 1104.033322][T18300] loop2: detected capacity change from 0 to 545 [ 1104.033524][T18299] loop4: detected capacity change from 0 to 545 [ 1104.046716][T18299] FAULT_INJECTION: forcing a failure. [ 1104.046716][T18299] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.059341][T18299] CPU: 1 PID: 18299 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1104.070421][T18299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.080471][T18299] Call Trace: [ 1104.083781][T18299] [ 1104.086704][T18299] dump_stack_lvl+0xd6/0x122 [ 1104.091300][T18299] dump_stack+0x11/0x1b [ 1104.095538][T18299] should_fail+0x23c/0x250 [ 1104.099949][T18299] ? vfs_parse_fs_string+0x6d/0xd0 [ 1104.105055][T18299] __should_failslab+0x81/0x90 [ 1104.109824][T18299] should_failslab+0x5/0x20 [ 1104.114370][T18299] __kmalloc_track_caller+0x6d/0x370 [ 1104.119714][T18299] kmemdup_nul+0x27/0x70 [ 1104.123972][T18299] vfs_parse_fs_string+0x6d/0xd0 [ 1104.128979][T18299] path_mount+0xf94/0x1c40 [ 1104.133396][T18299] ? kmem_cache_free+0x65/0x110 [ 1104.138328][T18299] __se_sys_mount+0x24b/0x2f0 [ 1104.143006][T18299] __x64_sys_mount+0x63/0x70 [ 1104.147634][T18299] do_syscall_64+0x44/0xd0 [ 1104.152044][T18299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.157936][T18299] RIP: 0033:0x7f533ffa557a [ 1104.162343][T18299] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1104.181950][T18299] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1104.190467][T18299] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1104.198533][T18299] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1104.206496][T18299] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1104.214499][T18299] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1104.222467][T18299] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1104.230436][T18299] [ 1104.246782][T18303] loop5: detected capacity change from 0 to 545 12:55:54 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x12000000}, 0x1c) 12:55:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnexthop={0x2c, 0x6a, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@NHA_FDB={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000804) 12:55:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x2}}, 0x20) close(r2) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xe2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x106, 0x2}}, 0x20) (async) close(r2) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0xe2}}, 0x10) (async) 12:55:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 70) 12:55:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4400000000000000) 12:55:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffefff) 12:55:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnexthop={0x2c, 0x6a, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@NHA_FDB={0x4}, @NHA_FDB={0x4}, @NHA_GROUPS={0x4}, @NHA_MASTER={0x8, 0xa, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000804) [ 1104.606581][T18313] loop2: detected capacity change from 0 to 545 [ 1104.613403][T18314] loop5: detected capacity change from 0 to 545 [ 1104.621910][T18317] loop4: detected capacity change from 0 to 545 [ 1104.630979][T18317] FAULT_INJECTION: forcing a failure. [ 1104.630979][T18317] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.643647][T18317] CPU: 1 PID: 18317 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1104.654754][T18317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.664821][T18317] Call Trace: [ 1104.668095][T18317] [ 1104.671023][T18317] dump_stack_lvl+0xd6/0x122 [ 1104.675726][T18317] dump_stack+0x11/0x1b [ 1104.679997][T18317] should_fail+0x23c/0x250 [ 1104.684418][T18317] ? generic_parse_monolithic+0x142/0x1d0 [ 1104.690171][T18317] __should_failslab+0x81/0x90 [ 1104.694971][T18317] should_failslab+0x5/0x20 [ 1104.699483][T18317] __kmalloc_track_caller+0x6d/0x370 [ 1104.704771][T18317] ? ext4_parse_param+0xe7/0xba0 [ 1104.709810][T18317] kmemdup_nul+0x27/0x70 [ 1104.714062][T18317] generic_parse_monolithic+0x142/0x1d0 [ 1104.719756][T18317] parse_monolithic_mount_data+0x3e/0x50 [ 1104.725668][T18317] path_mount+0x119c/0x1c40 [ 1104.730184][T18317] ? kmem_cache_free+0x65/0x110 [ 1104.735030][T18317] __se_sys_mount+0x24b/0x2f0 [ 1104.739752][T18317] __x64_sys_mount+0x63/0x70 [ 1104.744344][T18317] do_syscall_64+0x44/0xd0 [ 1104.748760][T18317] entry_SYSCALL_64_after_hwframe+0x44/0xae 12:55:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffff8c) [ 1104.754650][T18317] RIP: 0033:0x7f533ffa557a [ 1104.759061][T18317] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1104.778707][T18317] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1104.787167][T18317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1104.795155][T18317] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 12:55:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x800, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f0000000000)=0x5, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001980)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}, {@privport}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@access_uid}, {@privport}, {@afid={'afid', 0x3d, 0xf95d}}, {@msize={'msize', 0x3d, 0x428}}]}}) r4 = syz_open_dev$vcsu(&(0x7f0000000500), 0x8, 0x400000) r5 = socket$isdn(0x22, 0x3, 0x21) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x1ff}}, './file0\x00'}) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net\x00') io_submit(0x0, 0x6, &(0x7f0000001840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0xfffc, 0xffffffffffffffff, &(0x7f0000000680)="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", 0x1000, 0x7, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="fb9399a3f81b2cc2509d7c9b4be6e5efbd5ca4e1360a1b6f68501b39ec10daf484037559865ed4123ff33561e1a13d84b37c07c1914bb8a094887c2ba3b619e5d5e84e219ea144f393e362eedb12bb2cf0aca81b76ecf8bb47b1b502a364c8ad97587397aeb0ac718cdaa8a223617e5de27c591758a3c112c69fd7db4b961437fc157ebd146727c3ba85625b75a87c11f83a46a921f05afaaa13113b170849f04bf6072059d43871b697e39376fe319e92a9ca75ab78aad8d2a56469614e673bf6de582e76748f523bd506bb9389159b51b70f8d7a5ab539d6ea95a948f2b07e690931037c7dfe38e36609e67e6a3e", 0xef, 0x80}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f00000003c0)="38f7bdb9b3ca7462225488798e70d9ffc1fd11f67d40de8b9ac437af795054603a19226d359ffea9549ed0c65582a608f6f7911f2f18acda7de1d832d9057418252500a7be415ca0fe7bced38fffeb9bdee6e439424638e1d6f1d3af2ee97047c8505f216c5f9aa922acde5a0ab4a841d0247d2301dbb5b66866d0e6ce5bdf229f55781ac4d970bc9cbf45", 0x8b, 0x9, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f00000004c0)="9724b0ff636d185dcff48468f9165ea3805bff5e2cf9f329c946c7c9b37c869b708cb53cf374d50f97e5a460816e29cfba", 0x31, 0x4, 0x0, 0x1, r4}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x2, 0x3ff, r5, &(0x7f0000000580)="304cd43671db57ad06a036fe06711e2550310fb9ca4b100419e408e80b458404bed9eb27966b089174c8fbcc7fba9e24d34f296f67404d14da392bfc214e47eb72f80c6c30b9e6ab5bdd19c2fdd00de87742922618cf47f476aa", 0x5a, 0x7, 0x0, 0x0, r6}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x8, 0x20, r1, &(0x7f00000016c0)="d931e4dedaad5b9f470af95d626df07f8a18d442ff70ea615c7ae6d41250580179fd1a1bfa8c3b25a0015b84ce00e1e8ebbe2ae2c0eced22d030274b6cff4de1aa91fcd929b8bc3a7e3b959f076291d8c2c51bb6a1cdf6f3c9e0dd68f06630454a66cde546110b87b77e8217082e86cd88d499cf6e3d9979d45966f7b5e68269bca55969d450ceffb44d70692f93530968bcf7b6975d33db895d8ed4783f3de90c628489edf9fd37f206d6188a12148fd186a3457da506f821f16a023563c202818c", 0xc2, 0xb977, 0x0, 0x3, r7}]) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r8) socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="000000000000000000000000000000f538f9a9bfae82c7ce77afadfb8676b1a86cfcfc065e993f1a2a3f99fe0010f3404501f8a460036db6859287968fd859b7c2", @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c004d4b7f9d856d067cc62ba2d06462a5371e6ac10adedf6fc32697070027dffbfbad256a8711"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 12:55:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x800, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f0000000000)=0x5, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001980)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}, {@privport}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@access_uid}, {@privport}, {@afid={'afid', 0x3d, 0xf95d}}, {@msize={'msize', 0x3d, 0x428}}]}}) r4 = syz_open_dev$vcsu(&(0x7f0000000500), 0x8, 0x400000) r5 = socket$isdn(0x22, 0x3, 0x21) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x1ff}}, './file0\x00'}) (async) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net\x00') io_submit(0x0, 0x6, &(0x7f0000001840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0xfffc, 0xffffffffffffffff, &(0x7f0000000680)="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", 0x1000, 0x7, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="fb9399a3f81b2cc2509d7c9b4be6e5efbd5ca4e1360a1b6f68501b39ec10daf484037559865ed4123ff33561e1a13d84b37c07c1914bb8a094887c2ba3b619e5d5e84e219ea144f393e362eedb12bb2cf0aca81b76ecf8bb47b1b502a364c8ad97587397aeb0ac718cdaa8a223617e5de27c591758a3c112c69fd7db4b961437fc157ebd146727c3ba85625b75a87c11f83a46a921f05afaaa13113b170849f04bf6072059d43871b697e39376fe319e92a9ca75ab78aad8d2a56469614e673bf6de582e76748f523bd506bb9389159b51b70f8d7a5ab539d6ea95a948f2b07e690931037c7dfe38e36609e67e6a3e", 0xef, 0x80}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f00000003c0)="38f7bdb9b3ca7462225488798e70d9ffc1fd11f67d40de8b9ac437af795054603a19226d359ffea9549ed0c65582a608f6f7911f2f18acda7de1d832d9057418252500a7be415ca0fe7bced38fffeb9bdee6e439424638e1d6f1d3af2ee97047c8505f216c5f9aa922acde5a0ab4a841d0247d2301dbb5b66866d0e6ce5bdf229f55781ac4d970bc9cbf45", 0x8b, 0x9, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f00000004c0)="9724b0ff636d185dcff48468f9165ea3805bff5e2cf9f329c946c7c9b37c869b708cb53cf374d50f97e5a460816e29cfba", 0x31, 0x4, 0x0, 0x1, r4}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x2, 0x3ff, r5, &(0x7f0000000580)="304cd43671db57ad06a036fe06711e2550310fb9ca4b100419e408e80b458404bed9eb27966b089174c8fbcc7fba9e24d34f296f67404d14da392bfc214e47eb72f80c6c30b9e6ab5bdd19c2fdd00de87742922618cf47f476aa", 0x5a, 0x7, 0x0, 0x0, r6}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x8, 0x20, r1, &(0x7f00000016c0)="d931e4dedaad5b9f470af95d626df07f8a18d442ff70ea615c7ae6d41250580179fd1a1bfa8c3b25a0015b84ce00e1e8ebbe2ae2c0eced22d030274b6cff4de1aa91fcd929b8bc3a7e3b959f076291d8c2c51bb6a1cdf6f3c9e0dd68f06630454a66cde546110b87b77e8217082e86cd88d499cf6e3d9979d45966f7b5e68269bca55969d450ceffb44d70692f93530968bcf7b6975d33db895d8ed4783f3de90c628489edf9fd37f206d6188a12148fd186a3457da506f821f16a023563c202818c", 0xc2, 0xb977, 0x0, 0x3, r7}]) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r8) socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="000000000000000000000000000000f538f9a9bfae82c7ce77afadfb8676b1a86cfcfc065e993f1a2a3f99fe0010f3404501f8a460036db6859287968fd859b7c2", @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c004d4b7f9d856d067cc62ba2d06462a5371e6ac10adedf6fc32697070027dffbfbad256a8711"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 1104.803126][T18317] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1104.811117][T18317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1104.819093][T18317] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1104.827169][T18317] [ 1104.835467][T18328] 9pnet_fd: Insufficient options for proto=fd 12:55:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6ac0b77543c42579c7b684da682f3ac2ea5bfa91b1b816b233b7fffbb47f6cef0967f42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf600000000321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f3a8a9d7dcdd0a0b88fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a8ff9b1d62747cd1ece1d9bc12ffd1cced46d3b7ba737d01649f120e8300", 0xa2, 0x0, 0x2, 0xc, 0x0, 0x40, 0x4, 0xfd}, r4}}, 0x128) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r5) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="47ffffe8", @ANYRES16=r6, @ANYBLOB="01000000000000000000010000001c000c8018000b8010000a00000003000c000b800800090000000000040008800400048008000200010000000800010000000000"], 0x48}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) 12:55:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4800000000000000) [ 1104.859515][T18330] 9pnet_fd: Insufficient options for proto=fd [ 1104.892458][T18337] loop5: detected capacity change from 0 to 545 [ 1104.905655][T18339] loop2: detected capacity change from 0 to 545 12:55:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 71) 12:55:54 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x20000000}, 0x1c) 12:55:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async, rerun: 32) r2 = socket(0x25, 0x800, 0x0) (rerun: 32) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r2, 0x29, 0x42, &(0x7f0000000000)=0x5, 0x4) (async, rerun: 64) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async, rerun: 64) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001980)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}, {@privport}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@access_uid}, {@privport}, {@afid={'afid', 0x3d, 0xf95d}}, {@msize={'msize', 0x3d, 0x428}}]}}) r4 = syz_open_dev$vcsu(&(0x7f0000000500), 0x8, 0x400000) r5 = socket$isdn(0x22, 0x3, 0x21) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000600)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x1ff}}, './file0\x00'}) (async, rerun: 64) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000017c0)='net\x00') io_submit(0x0, 0x6, &(0x7f0000001840)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0xfffc, 0xffffffffffffffff, &(0x7f0000000680)="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", 0x1000, 0x7, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="fb9399a3f81b2cc2509d7c9b4be6e5efbd5ca4e1360a1b6f68501b39ec10daf484037559865ed4123ff33561e1a13d84b37c07c1914bb8a094887c2ba3b619e5d5e84e219ea144f393e362eedb12bb2cf0aca81b76ecf8bb47b1b502a364c8ad97587397aeb0ac718cdaa8a223617e5de27c591758a3c112c69fd7db4b961437fc157ebd146727c3ba85625b75a87c11f83a46a921f05afaaa13113b170849f04bf6072059d43871b697e39376fe319e92a9ca75ab78aad8d2a56469614e673bf6de582e76748f523bd506bb9389159b51b70f8d7a5ab539d6ea95a948f2b07e690931037c7dfe38e36609e67e6a3e", 0xef, 0x80}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x7, 0xffffffffffffffff, &(0x7f00000003c0)="38f7bdb9b3ca7462225488798e70d9ffc1fd11f67d40de8b9ac437af795054603a19226d359ffea9549ed0c65582a608f6f7911f2f18acda7de1d832d9057418252500a7be415ca0fe7bced38fffeb9bdee6e439424638e1d6f1d3af2ee97047c8505f216c5f9aa922acde5a0ab4a841d0247d2301dbb5b66866d0e6ce5bdf229f55781ac4d970bc9cbf45", 0x8b, 0x9, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f00000004c0)="9724b0ff636d185dcff48468f9165ea3805bff5e2cf9f329c946c7c9b37c869b708cb53cf374d50f97e5a460816e29cfba", 0x31, 0x4, 0x0, 0x1, r4}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x2, 0x3ff, r5, &(0x7f0000000580)="304cd43671db57ad06a036fe06711e2550310fb9ca4b100419e408e80b458404bed9eb27966b089174c8fbcc7fba9e24d34f296f67404d14da392bfc214e47eb72f80c6c30b9e6ab5bdd19c2fdd00de87742922618cf47f476aa", 0x5a, 0x7, 0x0, 0x0, r6}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x8, 0x20, r1, &(0x7f00000016c0)="d931e4dedaad5b9f470af95d626df07f8a18d442ff70ea615c7ae6d41250580179fd1a1bfa8c3b25a0015b84ce00e1e8ebbe2ae2c0eced22d030274b6cff4de1aa91fcd929b8bc3a7e3b959f076291d8c2c51bb6a1cdf6f3c9e0dd68f06630454a66cde546110b87b77e8217082e86cd88d499cf6e3d9979d45966f7b5e68269bca55969d450ceffb44d70692f93530968bcf7b6975d33db895d8ed4783f3de90c628489edf9fd37f206d6188a12148fd186a3457da506f821f16a023563c202818c", 0xc2, 0xb977, 0x0, 0x3, r7}]) (async) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r8) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="000000000000000000000000000000f538f9a9bfae82c7ce77afadfb8676b1a86cfcfc065e993f1a2a3f99fe0010f3404501f8a460036db6859287968fd859b7c2", @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c004d4b7f9d856d067cc62ba2d06462a5371e6ac10adedf6fc32697070027dffbfbad256a8711"]) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 12:55:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6ac0b77543c42579c7b684da682f3ac2ea5bfa91b1b816b233b7fffbb47f6cef0967f42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf600000000321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f3a8a9d7dcdd0a0b88fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a8ff9b1d62747cd1ece1d9bc12ffd1cced46d3b7ba737d01649f120e8300", 0xa2, 0x0, 0x2, 0xc, 0x0, 0x40, 0x4, 0xfd}, r4}}, 0x128) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r5) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="47ffffe8", @ANYRES16=r6, @ANYBLOB="01000000000000000000010000001c000c8018000b8010000a00000003000c000b800800090000000000040008800400048008000200010000000800010000000000"], 0x48}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6ac0b77543c42579c7b684da682f3ac2ea5bfa91b1b816b233b7fffbb47f6cef0967f42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf600000000321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f3a8a9d7dcdd0a0b88fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a8ff9b1d62747cd1ece1d9bc12ffd1cced46d3b7ba737d01649f120e8300", 0xa2, 0x0, 0x2, 0xc, 0x0, 0x40, 0x4, 0xfd}, r4}}, 0x128) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r5) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="47ffffe8", @ANYRES16=r6, @ANYBLOB="01000000000000000000010000001c000c8018000b8010000a00000003000c000b800800090000000000040008800400048008000200010000000800010000000000"], 0x48}}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) (async) 12:55:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffff97) 12:55:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4c00000000000000) 12:55:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6ac0b77543c42579c7b684da682f3ac2ea5bfa91b1b816b233b7fffbb47f6cef0967f42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf600000000321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f3a8a9d7dcdd0a0b88fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a8ff9b1d62747cd1ece1d9bc12ffd1cced46d3b7ba737d01649f120e8300", 0xa2, 0x0, 0x2, 0xc, 0x0, 0x40, 0x4, 0xfd}, r4}}, 0x128) (async) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r5) (async) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="47ffffe8", @ANYRES16=r6, @ANYBLOB="01000000000000000000010000001c000c8018000b8010000a00000003000c000b800800090000000000040008800400048008000200010000000800010000000000"], 0x48}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) 12:55:55 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) keyctl$chown(0x4, 0x0, 0xee00, r0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1105.475185][T18360] loop2: detected capacity change from 0 to 545 [ 1105.476491][T18364] loop5: detected capacity change from 0 to 545 [ 1105.482232][T18345] 9pnet_fd: Insufficient options for proto=fd [ 1105.489243][T18366] loop4: detected capacity change from 0 to 545 [ 1105.534103][T18366] FAULT_INJECTION: forcing a failure. [ 1105.534103][T18366] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.546802][T18366] CPU: 0 PID: 18366 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1105.557894][T18366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.567993][T18366] Call Trace: [ 1105.571267][T18366] [ 1105.574258][T18366] dump_stack_lvl+0xd6/0x122 [ 1105.578876][T18366] dump_stack+0x11/0x1b [ 1105.583031][T18366] should_fail+0x23c/0x250 [ 1105.587464][T18366] ? generic_parse_monolithic+0x142/0x1d0 [ 1105.593204][T18366] __should_failslab+0x81/0x90 [ 1105.597974][T18366] should_failslab+0x5/0x20 [ 1105.602520][T18366] __kmalloc_track_caller+0x6d/0x370 [ 1105.607813][T18366] ? ext4_parse_param+0xe7/0xba0 [ 1105.612752][T18366] kmemdup_nul+0x27/0x70 [ 1105.617061][T18366] generic_parse_monolithic+0x142/0x1d0 [ 1105.622614][T18366] parse_monolithic_mount_data+0x3e/0x50 [ 1105.628246][T18366] path_mount+0x119c/0x1c40 [ 1105.632865][T18366] ? kmem_cache_free+0x65/0x110 [ 1105.638046][T18366] __se_sys_mount+0x24b/0x2f0 [ 1105.642742][T18366] __x64_sys_mount+0x63/0x70 [ 1105.647328][T18366] do_syscall_64+0x44/0xd0 [ 1105.651744][T18366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.657692][T18366] RIP: 0033:0x7f533ffa557a [ 1105.662159][T18366] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 12:55:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff4) 12:55:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6400000000000000) [ 1105.681791][T18366] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1105.690208][T18366] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1105.698178][T18366] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1105.706203][T18366] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1105.714276][T18366] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1105.722292][T18366] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1105.730288][T18366] 12:55:55 executing program 3: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x127141, 0x1a) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x268}}, 0x20008800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000680)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[@ANYRESHEX=r3, @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf251800000078000680080001000400000008000600070000000800010000000080040002000800060006000000040002004400040067636d28616573290000000000000000000000000000000000000000000000001c0000004c17307b49191f161cbb4be009f9c5bff240b9b9e68e5be6ac0278e604000200040005002000028014000380080001000600000008000200030000000800020000000000180007800c00030005000000000000000800010009000000100007800c0004000500000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10000801}, 0x8000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000ec0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x7ff}, @ib={0x1b, 0xd5, 0x2, {"ff6239cbcd09ab309866bedb7da438a6"}, 0x7, 0xb0, 0x7fff}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000700)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x3a1d, {"52b940ee5b785ef2975f5e7b3931018d"}, 0x7, 0x9, 0xffffffff}, @in={0x2, 0x4e20, @remote}}}, 0x118) r5 = syz_open_dev$vcsu(&(0x7f00000009c0), 0x9, 0xe0481) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x834f, "1494d2a28d67f26de439d37b8c6740b704b4fb9783e9c745aafdeb2aaa3a27728a51471fe8bf6a9c4659ddf8ed4e13106b02af0975dca96a9e720a2bccfea0083f0874c10824ff23c23954108e5b3ec7227a9d5dd0e24bb823a787886b9175735c29cf88f0f282a571e6e6d53257a269ae0210703e7f3bd5a8d716f206e5af56616a371ebe27643f4455c522da631bf95563964195f1e50971cb7af3b05e73dc4e958746b4dc762a64ad9517cd318747908ff54cb0431d0704782385d0c2c647df77b7dd926b5df9145d867bc77c480c379e3228015662f73fe137cfa2146bdb885a9724793d5fa3e307f2a91789b6c4ddfea245344e93415523f2a2458a2163", 0x5, 0x5, 0x8, 0x20, 0x81, 0x1f, 0x3, 0x1}, r2}}, 0x128) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000580)={0x4, {{0xa, 0x8, 0x50f3, @rand_addr=' \x01\x00', 0x1}}}, 0x88) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x400040, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0dd78e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade23244842e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57e4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145f9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e8300", 0xff}, r2}}, 0x128) 12:55:55 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) keyctl$chown(0x4, 0x0, 0xee00, r0) (async) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 72) [ 1105.799639][T18386] loop5: detected capacity change from 0 to 545 [ 1105.801101][T18388] loop4: detected capacity change from 0 to 545 [ 1105.806424][T18390] loop2: detected capacity change from 0 to 545 [ 1105.813982][T18388] FAULT_INJECTION: forcing a failure. [ 1105.813982][T18388] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.831155][T18388] CPU: 0 PID: 18388 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1105.842181][T18388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.852238][T18388] Call Trace: [ 1105.855580][T18388] [ 1105.858506][T18388] dump_stack_lvl+0xd6/0x122 [ 1105.863114][T18388] dump_stack+0x11/0x1b [ 1105.867272][T18388] should_fail+0x23c/0x250 [ 1105.871723][T18388] ? alloc_super+0x3a/0x510 [ 1105.876328][T18388] __should_failslab+0x81/0x90 [ 1105.881092][T18388] should_failslab+0x5/0x20 [ 1105.885599][T18388] kmem_cache_alloc_trace+0x52/0x350 [ 1105.890885][T18388] ? disk_unblock_events+0x35/0x40 [ 1105.895999][T18388] ? blkdev_get_by_dev+0xc34/0xcf0 [ 1105.901233][T18388] alloc_super+0x3a/0x510 [ 1105.905602][T18388] ? get_tree_bdev+0x3d0/0x3d0 [ 1105.910400][T18388] sget_fc+0x1b3/0x450 [ 1105.914531][T18388] ? test_bdev_super_fc+0x40/0x40 [ 1105.919550][T18388] get_tree_bdev+0x1c2/0x3d0 [ 1105.924181][T18388] ? note_qf_name+0x140/0x140 [ 1105.928861][T18388] vfs_get_tree+0x4a/0x1a0 [ 1105.933421][T18388] path_mount+0x11cf/0x1c40 [ 1105.937964][T18388] ? kmem_cache_free+0x65/0x110 [ 1105.942807][T18388] __se_sys_mount+0x24b/0x2f0 [ 1105.947522][T18388] __x64_sys_mount+0x63/0x70 [ 1105.952182][T18388] do_syscall_64+0x44/0xd0 [ 1105.956614][T18388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.962496][T18388] RIP: 0033:0x7f533ffa557a [ 1105.966963][T18388] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1105.986697][T18388] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1105.995095][T18388] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1106.003052][T18388] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1106.011112][T18388] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1106.019152][T18388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1106.027105][T18388] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1106.035192][T18388] 12:55:55 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x20010010}, 0x1c) 12:55:55 executing program 0: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) keyctl$chown(0x4, 0x0, 0xee00, r0) (async) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6800000000000000) 12:55:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffff6) 12:55:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 73) 12:55:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000040)=0x400, 0x4) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000040)=0x400, 0x4) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f0000000040)=0x400, 0x4) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1106.369371][T18402] loop5: detected capacity change from 0 to 545 [ 1106.371550][T18400] loop2: detected capacity change from 0 to 545 [ 1106.384154][T18406] loop4: detected capacity change from 0 to 545 [ 1106.401495][T18406] FAULT_INJECTION: forcing a failure. [ 1106.401495][T18406] name failslab, interval 1, probability 0, space 0, times 0 12:55:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffb) [ 1106.414156][T18406] CPU: 1 PID: 18406 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1106.425335][T18406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.435388][T18406] Call Trace: [ 1106.438665][T18406] [ 1106.441663][T18406] dump_stack_lvl+0xd6/0x122 [ 1106.446258][T18406] dump_stack+0x11/0x1b [ 1106.450396][T18406] should_fail+0x23c/0x250 [ 1106.454852][T18406] ? kzalloc+0x1d/0x30 [ 1106.458972][T18406] __should_failslab+0x81/0x90 [ 1106.464745][T18406] should_failslab+0x5/0x20 [ 1106.469237][T18406] __kmalloc+0x6f/0x370 [ 1106.473377][T18406] kzalloc+0x1d/0x30 [ 1106.477320][T18406] security_sb_alloc+0x3c/0x180 [ 1106.482151][T18406] alloc_super+0x10b/0x510 [ 1106.486599][T18406] ? get_tree_bdev+0x3d0/0x3d0 [ 1106.491350][T18406] sget_fc+0x1b3/0x450 [ 1106.495430][T18406] ? test_bdev_super_fc+0x40/0x40 [ 1106.500445][T18406] get_tree_bdev+0x1c2/0x3d0 [ 1106.505072][T18406] ? note_qf_name+0x140/0x140 [ 1106.509736][T18406] vfs_get_tree+0x4a/0x1a0 [ 1106.514173][T18406] path_mount+0x11cf/0x1c40 [ 1106.518670][T18406] ? kmem_cache_free+0x65/0x110 [ 1106.523718][T18406] __se_sys_mount+0x24b/0x2f0 [ 1106.528489][T18406] __x64_sys_mount+0x63/0x70 [ 1106.533085][T18406] do_syscall_64+0x44/0xd0 [ 1106.537495][T18406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1106.543442][T18406] RIP: 0033:0x7f533ffa557a [ 1106.547897][T18406] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 12:55:56 executing program 3: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x127141, 0x1a) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="68020000010501040000000000000000070000095402010000000000050000008005050008001e0073797a3100000000000000000000000000000000000000000000000000000000dc0d3051b73942447f002ce86f775ec4bacb4ac17e72e322fe1c01e03d555b64a8508c460cdd70b697ed08facee0d3956292028c79f2317a21d7907cab3ea4e10300b08c0300000042dc00000700040000000000000000000000ff0f0700000020000000ff00c80a01000000ffff00007619030001000000020000000100200003000000ff7f0000ffff010002000000f9ffffff040008000100000001040000ff0001f002000000000000800700ed00020000000400000008003f00010000001f0000006c09020002000000ff0f0000feff01000100000000000000dbca020000000000010001000000030000000000050000003f000400030000000100000064000800010000000800000000801f00030000000002000005000002000000003f000000040072080300000006000000060001000000000020000000810005000000000006000000ff0002000000000001000000bcc10700020000000ffd000002000600010000000300000006003b00000000000000000000048c280300000005000000c300040001000000070000000600000002000000240000000100090003000000ffffff7f140e070000000000780f00000900020000000000ffffff7f11ae09000100000001000003000000090000000000000000800000ff07030003000000000000000000080002000000060000000200e7ff03000000090000000300008001000000ffffffff0200080002000000790300005c8105e1b372251e440419771fb77760548e9f69f5ed320d846382ab12c5b4123b4030ad41a37ce1c09a5fea42e2bbe66b172d5fb895e2f7e756abfc710ca4fb5a42638ef9cd027d57a574dbb422bf08913b1f05c5731db61828b7ed2331850e7f0869bf02a558dc7d035678154d81b220aafa39d7117678036a0eac5a3c3c018426ce78ac517e1b30618213d4dafcff6efb6df1b88cfacb5bd1f1c0c200f2935495769bef2a436608c49dfe45676a0e6befc1a86802a08b397363e5060aca0c8cdda4d02756fa53ddd2633b744741248777eb5d9d023f3ad119fdf0b642923bc6347646eecbbd"], 0x268}}, 0x20008800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000680)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[@ANYRESHEX=r3, @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf251800000078000680080001000400000008000600070000000800010000000080040002000800060006000000040002004400040067636d28616573290000000000000000000000000000000000000000000000001c0000004c17307b49191f161cbb4be009f9c5bff240b9b9e68e5be6ac0278e604000200040005002000028014000380080001000600000008000200030000000800020000000000180007800c00030005000000000000000800010009000000100007800c0004000500000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10000801}, 0x8000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000ec0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x7ff}, @ib={0x1b, 0xd5, 0x2, {"ff6239cbcd09ab309866bedb7da438a6"}, 0x7, 0xb0, 0x7fff}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000700)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x3a1d, {"52b940ee5b785ef2975f5e7b3931018d"}, 0x7, 0x9, 0xffffffff}, @in={0x2, 0x4e20, @remote}}}, 0x118) r5 = syz_open_dev$vcsu(&(0x7f00000009c0), 0x9, 0xe0481) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x834f, "1494d2a28d67f26de439d37b8c6740b704b4fb9783e9c745aafdeb2aaa3a27728a51471fe8bf6a9c4659ddf8ed4e13106b02af0975dca96a9e720a2bccfea0083f0874c10824ff23c23954108e5b3ec7227a9d5dd0e24bb823a787886b9175735c29cf88f0f282a571e6e6d53257a269ae0210703e7f3bd5a8d716f206e5af56616a371ebe27643f4455c522da631bf95563964195f1e50971cb7af3b05e73dc4e958746b4dc762a64ad9517cd318747908ff54cb0431d0704782385d0c2c647df77b7dd926b5df9145d867bc77c480c379e3228015662f73fe137cfa2146bdb885a9724793d5fa3e307f2a91789b6c4ddfea245344e93415523f2a2458a2163", 0x5, 0x5, 0x8, 0x20, 0x81, 0x1f, 0x3, 0x1}, r2}}, 0x128) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000580)={0x4, {{0xa, 0x8, 0x50f3, @rand_addr=' \x01\x00', 0x1}}}, 0x88) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x400040, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0dd78e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade23244842e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57e4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145f9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e8300", 0xff}, r2}}, 0x128) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x127141, 0x1a) (async) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x268}}, 0x20008800) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r3) (async) socket(0x25, 0x1, 0x0) (async) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000680)) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (async) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[@ANYRESHEX=r3, @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf251800000078000680080001000400000008000600070000000800010000000080040002000800060006000000040002004400040067636d28616573290000000000000000000000000000000000000000000000001c0000004c17307b49191f161cbb4be009f9c5bff240b9b9e68e5be6ac0278e604000200040005002000028014000380080001000600000008000200030000000800020000000000180007800c00030005000000000000000800010009000000100007800c0004000500000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10000801}, 0x8000) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000ec0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x7ff}, @ib={0x1b, 0xd5, 0x2, {"ff6239cbcd09ab309866bedb7da438a6"}, 0x7, 0xb0, 0x7fff}}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000700)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x3a1d, {"52b940ee5b785ef2975f5e7b3931018d"}, 0x7, 0x9, 0xffffffff}, @in={0x2, 0x4e20, @remote}}}, 0x118) (async) syz_open_dev$vcsu(&(0x7f00000009c0), 0x9, 0xe0481) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x834f, "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", 0x5, 0x5, 0x8, 0x20, 0x81, 0x1f, 0x3, 0x1}, r2}}, 0x128) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000580)={0x4, {{0xa, 0x8, 0x50f3, @rand_addr=' \x01\x00', 0x1}}}, 0x88) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x400040, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0dd78e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade23244842e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57e4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145f9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e8300", 0xff}, r2}}, 0x128) (async) 12:55:56 executing program 0: prctl$PR_SET_ENDIAN(0x14, 0xb3643967562c2818) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x1, 0x4) 12:55:56 executing program 0: prctl$PR_SET_ENDIAN(0x14, 0xb3643967562c2818) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x1, 0x4) [ 1106.567488][T18406] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1106.575912][T18406] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1106.583997][T18406] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1106.591949][T18406] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1106.599963][T18406] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1106.608058][T18406] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1106.616048][T18406] [ 1106.656033][T18427] loop5: detected capacity change from 0 to 545 12:55:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x3f000000}, 0x1c) 12:55:56 executing program 0: prctl$PR_SET_ENDIAN(0x14, 0xb3643967562c2818) (async) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x1, 0x4) 12:55:56 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6c00000000000000) 12:55:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 74) 12:55:56 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffd) 12:55:56 executing program 3: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x127141, 0x1a) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="68020000010501040000000000000000070000095402010000000000050000008005050008001e0073797a3100000000000000000000000000000000000000000000000000000000dc0d3051b73942447f002ce86f775ec4bacb4ac17e72e322fe1c01e03d555b64a8508c460cdd70b697ed08facee0d3956292028c79f2317a21d7907cab3ea4e10300b08c0300000042dc00000700040000000000000000000000ff0f0700000020000000ff00c80a01000000ffff00007619030001000000020000000100200003000000ff7f0000ffff010002000000f9ffffff040008000100000001040000ff0001f002000000000000800700ed00020000000400000008003f00010000001f0000006c09020002000000ff0f0000feff01000100000000000000dbca020000000000010001000000030000000000050000003f000400030000000100000064000800010000000800000000801f00030000000002000005000002000000003f000000040072080300000006000000060001000000000020000000810005000000000006000000ff0002000000000001000000bcc10700020000000ffd000002000600010000000300000006003b00000000000000000000048c280300000005000000c300040001000000070000000600000002000000240000000100090003000000ffffff7f140e070000000000780f00000900020000000000ffffff7f11ae09000100000001000003000000090000000000000000800000ff07030003000000000000000000080002000000060000000200e7ff03000000090000000300008001000000ffffffff0200080002000000790300005c8105e1b372251e440419771fb77760548e9f69f5ed320d846382ab12c5b4123b4030ad41a37ce1c09a5fea42e2bbe66b172d5fb895e2f7e756abfc710ca4fb5a42638ef9cd027d57a574dbb422bf08913b1f05c5731db61828b7ed2331850e7f0869bf02a558dc7d035678154d81b220aafa39d7117678036a0eac5a3c3c018426ce78ac517e1b30618213d4dafcff6efb6df1b88cfacb5bd1f1c0c200f2935495769bef2a436608c49dfe45676a0e6befc1a86802a08b397363e5060aca0c8cdda4d02756fa53ddd2633b744741248777eb5d9d023f3ad119fdf0b642923bc6347646eecbbd"], 0x268}}, 0x20008800) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000680)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[@ANYRESHEX=r3, @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf251800000078000680080001000400000008000600070000000800010000000080040002000800060006000000040002004400040067636d28616573290000000000000000000000000000000000000000000000001c0000004c17307b49191f161cbb4be009f9c5bff240b9b9e68e5be6ac0278e604000200040005002000028014000380080001000600000008000200030000000800020000000000180007800c00030005000000000000000800010009000000100007800c0004000500000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10000801}, 0x8000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000ec0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x7ff}, @ib={0x1b, 0xd5, 0x2, {"ff6239cbcd09ab309866bedb7da438a6"}, 0x7, 0xb0, 0x7fff}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000700)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x3a1d, {"52b940ee5b785ef2975f5e7b3931018d"}, 0x7, 0x9, 0xffffffff}, @in={0x2, 0x4e20, @remote}}}, 0x118) r5 = syz_open_dev$vcsu(&(0x7f00000009c0), 0x9, 0xe0481) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x834f, "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", 0x5, 0x5, 0x8, 0x20, 0x81, 0x1f, 0x3, 0x1}, r2}}, 0x128) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000580)={0x4, {{0xa, 0x8, 0x50f3, @rand_addr=' \x01\x00', 0x1}}}, 0x88) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x400040, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0dd78e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade23244842e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57e4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145f9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e8300", 0xff}, r2}}, 0x128) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x127141, 0x1a) (async) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x268}}, 0x20008800) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r3) (async) socket(0x25, 0x1, 0x0) (async) ioctl$SIOCPNADDRESOURCE(r3, 0x89e0, &(0x7f0000000680)) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) (async) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000980)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000480)=ANY=[@ANYRESHEX=r3, @ANYRES16=0x0, @ANYBLOB="010026bd7000fddbdf251800000078000680080001000400000008000600070000000800010000000080040002000800060006000000040002004400040067636d28616573290000000000000000000000000000000000000000000000001c0000004c17307b49191f161cbb4be009f9c5bff240b9b9e68e5be6ac0278e604000200040005002000028014000380080001000600000008000200030000000800020000000000180007800c00030005000000000000000800010009000000100007800c0004000500000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10000801}, 0x8000) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000ec0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x7fffffff, @mcast1, 0x7ff}, @ib={0x1b, 0xd5, 0x2, {"ff6239cbcd09ab309866bedb7da438a6"}, 0x7, 0xb0, 0x7fff}}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000700)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x3a1d, {"52b940ee5b785ef2975f5e7b3931018d"}, 0x7, 0x9, 0xffffffff}, @in={0x2, 0x4e20, @remote}}}, 0x118) (async) syz_open_dev$vcsu(&(0x7f00000009c0), 0x9, 0xe0481) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x834f, "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", 0x5, 0x5, 0x8, 0x20, 0x81, 0x1f, 0x3, 0x1}, r2}}, 0x128) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000580)={0x4, {{0xa, 0x8, 0x50f3, @rand_addr=' \x01\x00', 0x1}}}, 0x88) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0x400040, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0dd78e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade23244842e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57e4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145f9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e8300", 0xff}, r2}}, 0x128) (async) [ 1107.230784][T18439] loop2: detected capacity change from 0 to 545 [ 1107.236425][T18443] loop4: detected capacity change from 0 to 545 [ 1107.244495][T18444] loop5: detected capacity change from 0 to 545 [ 1107.252001][T18443] FAULT_INJECTION: forcing a failure. [ 1107.252001][T18443] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.264633][T18443] CPU: 0 PID: 18443 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1107.275727][T18443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.285782][T18443] Call Trace: [ 1107.289085][T18443] [ 1107.292009][T18443] dump_stack_lvl+0xd6/0x122 [ 1107.296614][T18443] dump_stack+0x11/0x1b [ 1107.300775][T18443] should_fail+0x23c/0x250 [ 1107.305191][T18443] ? __list_lru_init+0x70/0x6d0 [ 1107.310097][T18443] __should_failslab+0x81/0x90 [ 1107.310125][T18443] should_failslab+0x5/0x20 [ 1107.319388][T18443] __kmalloc+0x6f/0x370 [ 1107.323550][T18443] ? prealloc_memcg_shrinker+0x444/0x460 [ 1107.329239][T18443] __list_lru_init+0x70/0x6d0 [ 1107.333917][T18443] alloc_super+0x479/0x510 [ 1107.338355][T18443] ? get_tree_bdev+0x3d0/0x3d0 [ 1107.343116][T18443] sget_fc+0x1b3/0x450 [ 1107.347183][T18443] ? test_bdev_super_fc+0x40/0x40 [ 1107.352260][T18443] get_tree_bdev+0x1c2/0x3d0 [ 1107.356855][T18443] ? note_qf_name+0x140/0x140 [ 1107.361540][T18443] vfs_get_tree+0x4a/0x1a0 [ 1107.365961][T18443] path_mount+0x11cf/0x1c40 [ 1107.370471][T18443] ? kmem_cache_free+0x65/0x110 [ 1107.375324][T18443] __se_sys_mount+0x24b/0x2f0 12:55:56 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7400000000000000) 12:55:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1107.380036][T18443] __x64_sys_mount+0x63/0x70 [ 1107.384671][T18443] do_syscall_64+0x44/0xd0 [ 1107.389150][T18443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.395045][T18443] RIP: 0033:0x7f533ffa557a [ 1107.399541][T18443] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1107.419153][T18443] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:55:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x3c1040) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x26, 0x401, {"f0a12e5724883557ba0ac6a92982f403"}, 0x8, 0x200000, 0x90d}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x800, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, @in6={0xa, 0x4e23, 0x3, @loopback, 0x85b5}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) 12:55:56 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffe) 12:55:56 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x40000000}, 0x1c) 12:55:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x3c1040) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x26, 0x401, {"f0a12e5724883557ba0ac6a92982f403"}, 0x8, 0x200000, 0x90d}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x800, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, @in6={0xa, 0x4e23, 0x3, @loopback, 0x85b5}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x3c1040) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x26, 0x401, {"f0a12e5724883557ba0ac6a92982f403"}, 0x8, 0x200000, 0x90d}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e24, 0x800, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, @in6={0xa, 0x4e23, 0x3, @loopback, 0x85b5}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 1107.427572][T18443] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1107.435545][T18443] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1107.443515][T18443] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1107.451602][T18443] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1107.459570][T18443] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1107.467544][T18443] 12:55:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 75) [ 1107.537136][T18489] loop2: detected capacity change from 0 to 545 [ 1107.548531][T18491] loop5: detected capacity change from 0 to 545 [ 1107.575305][T18494] loop4: detected capacity change from 0 to 545 [ 1107.591625][T18494] FAULT_INJECTION: forcing a failure. [ 1107.591625][T18494] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.604531][T18494] CPU: 1 PID: 18494 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1107.615797][T18494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.625858][T18494] Call Trace: [ 1107.629131][T18494] [ 1107.632058][T18494] dump_stack_lvl+0xd6/0x122 [ 1107.636707][T18494] dump_stack+0x11/0x1b [ 1107.640863][T18494] should_fail+0x23c/0x250 [ 1107.645286][T18494] __should_failslab+0x81/0x90 [ 1107.650056][T18494] should_failslab+0x5/0x20 [ 1107.654561][T18494] kmem_cache_alloc_node_trace+0x61/0x310 [ 1107.660299][T18494] ? __kmalloc_node+0x30/0x40 [ 1107.665042][T18494] __kmalloc_node+0x30/0x40 [ 1107.669547][T18494] kvmalloc_node+0x6d/0x100 [ 1107.674126][T18494] __list_lru_init+0x2f7/0x6d0 [ 1107.678898][T18494] alloc_super+0x479/0x510 [ 1107.683316][T18494] ? get_tree_bdev+0x3d0/0x3d0 [ 1107.688123][T18494] sget_fc+0x1b3/0x450 [ 1107.692201][T18494] ? test_bdev_super_fc+0x40/0x40 [ 1107.697257][T18494] get_tree_bdev+0x1c2/0x3d0 [ 1107.701885][T18494] ? note_qf_name+0x140/0x140 [ 1107.706733][T18494] vfs_get_tree+0x4a/0x1a0 [ 1107.711156][T18494] path_mount+0x11cf/0x1c40 [ 1107.715727][T18494] ? kmem_cache_free+0x65/0x110 [ 1107.720588][T18494] __se_sys_mount+0x24b/0x2f0 [ 1107.725268][T18494] ? __this_cpu_preempt_check+0x18/0x20 [ 1107.730885][T18494] __x64_sys_mount+0x63/0x70 [ 1107.735478][T18494] do_syscall_64+0x44/0xd0 [ 1107.739917][T18494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.745813][T18494] RIP: 0033:0x7f533ffa557a [ 1107.750222][T18494] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1107.769869][T18494] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1107.778364][T18494] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1107.786336][T18494] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1107.794310][T18494] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1107.802312][T18494] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1107.810277][T18494] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1107.818252][T18494] 12:55:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000) 12:55:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 76) 12:55:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7a00000000000000) [ 1107.907380][T18498] loop5: detected capacity change from 0 to 545 12:55:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x2b, 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYRES64=r6, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="ee56555cfee67849e5e2209ca1f5a64c69e9df8d338d8a7907a3714891b866fc301b04704bc622d0d508288583120e4e80cd060ccb29a22f4572737416030f89e751bfe740ee3043edfeea0d8e4b2ddca9fd4798c016253fc343c7c9ee8d436d6842b9fa471e424842cda1a4312b85856e2286356fcbdcb796f866c7305f56cd", @ANYRES64=r5], 0x1a78) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="2c7cc3646e6fbf3ccb46774b488a044ba361b26b84", @ANYRESHEX=r8, @ANYBLOB=',\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xfffffffa, @local, 0x4}, {0xa, 0x4e24, 0x81, @loopback, 0x7fff}, r9, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast1, 0x200}, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, r3, 0x2}}, 0x48) 12:55:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x40000000000) [ 1107.948804][T18502] loop2: detected capacity change from 0 to 545 [ 1107.965731][T18504] 9pnet_fd: Insufficient options for proto=fd [ 1107.966453][T18505] loop4: detected capacity change from 0 to 545 [ 1107.992720][T18505] FAULT_INJECTION: forcing a failure. [ 1107.992720][T18505] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.993954][T18508] loop5: detected capacity change from 0 to 545 [ 1108.005405][T18505] CPU: 1 PID: 18505 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1108.022596][T18505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.032671][T18505] Call Trace: [ 1108.032679][T18505] [ 1108.032686][T18505] dump_stack_lvl+0xd6/0x122 [ 1108.043489][T18505] dump_stack+0x11/0x1b [ 1108.047673][T18505] should_fail+0x23c/0x250 [ 1108.052091][T18505] __should_failslab+0x81/0x90 [ 1108.056861][T18505] should_failslab+0x5/0x20 [ 1108.061435][T18505] kmem_cache_alloc_node_trace+0x61/0x310 [ 1108.067225][T18505] ? __kmalloc_node+0x30/0x40 [ 1108.071909][T18505] __kmalloc_node+0x30/0x40 [ 1108.076456][T18505] kvmalloc_node+0x6d/0x100 [ 1108.080968][T18505] __list_lru_init+0x2f7/0x6d0 [ 1108.085727][T18505] alloc_super+0x479/0x510 [ 1108.090193][T18505] ? get_tree_bdev+0x3d0/0x3d0 [ 1108.095007][T18505] sget_fc+0x1b3/0x450 [ 1108.099137][T18505] ? test_bdev_super_fc+0x40/0x40 [ 1108.104174][T18505] get_tree_bdev+0x1c2/0x3d0 [ 1108.108771][T18505] ? note_qf_name+0x140/0x140 [ 1108.113469][T18505] vfs_get_tree+0x4a/0x1a0 [ 1108.117892][T18505] path_mount+0x11cf/0x1c40 [ 1108.122390][T18505] ? kmem_cache_free+0x65/0x110 [ 1108.127285][T18505] __se_sys_mount+0x24b/0x2f0 [ 1108.131975][T18505] __x64_sys_mount+0x63/0x70 [ 1108.136575][T18505] do_syscall_64+0x44/0xd0 [ 1108.140995][T18505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.146960][T18505] RIP: 0033:0x7f533ffa557a [ 1108.151403][T18505] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1108.171017][T18505] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.179437][T18505] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1108.187414][T18505] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1108.195400][T18505] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1108.203377][T18505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1108.211350][T18505] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1108.219333][T18505] 12:55:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x2b, 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYRES64=r6, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="ee56555cfee67849e5e2209ca1f5a64c69e9df8d338d8a7907a3714891b866fc301b04704bc622d0d508288583120e4e80cd060ccb29a22f4572737416030f89e751bfe740ee3043edfeea0d8e4b2ddca9fd4798c016253fc343c7c9ee8d436d6842b9fa471e424842cda1a4312b85856e2286356fcbdcb796f866c7305f56cd", @ANYRES64=r5], 0x1a78) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="2c7cc3646e6fbf3ccb46774b488a044ba361b26b84", @ANYRESHEX=r8, @ANYBLOB=',\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xfffffffa, @local, 0x4}, {0xa, 0x4e24, 0x81, @loopback, 0x7fff}, r9, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast1, 0x200}, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, r3, 0x2}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r5) (async) socket(0x2b, 0x1, 0x0) (async) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYRES64=r6, @ANYBLOB="5a8a8de46ef4560ed12863ca88a1964e7abcd7583562d89b1136ee43ecb1e3373505e4c465c4498c0e2921c13aac401e4033cf3ee70ada283ba94887e4285834befb36ad09da119399ccc4627d1b06768da09b13edfc9a4a27e84d27259cded1449174613fe546479ada42d1946e578c522165d846c862cf2dc307ea99581b556a00ef812a02bc6256f1c6de83334ddbf40a9b1a1018d9df88897af821a933a1286a6ccbdfeaf7bfcf794a59eec6e20d84644faa4015bc0a8120dc88ee4661de21f81299edf1cfca31deb50701e598066cc211eb5cfa32c4f6ec91c64c5528bb02fd805d70b14fcad8e6805dbe22b61927869687e7a9975bdc06db58a674c982ccf5407ba18a536a7b7150435d617fc2e42572de19c95e72b4737630f7ede54dee42bf5e15a431aeb6a1b3a5beb04f7cb7079c985c285d8f79756ed3fbd0ec57ebe9f10b58b90d3dcfa42cf61f8bb750a4c681d7088314497845953bccee997d1e850d7aa586eb2ed55d23f139cbf2b2bd7b7a746e070e24f475a3765536", @ANYRESDEC=r6, @ANYBLOB="ee56555cfee67849e5e2209ca1f5a64c69e9df8d338d8a7907a3714891b866fc301b04704bc622d0d508288583120e4e80cd060ccb29a22f4572737416030f89e751bfe740ee3043edfeea0d8e4b2ddca9fd4798c016253fc343c7c9ee8d436d6842b9fa471e424842cda1a4312b85856e2286356fcbdcb796f866c7305f56cd", @ANYRES64=r5], 0x1a78) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r7) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="2c7cc3646e6fbf3ccb46774b488a044ba361b26b84", @ANYRESHEX=r8, @ANYBLOB=',\x00']) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x111, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xfffffffa, @local, 0x4}, {0xa, 0x4e24, 0x81, @loopback, 0x7fff}, r9, 0x2}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast1, 0x200}, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, r3, 0x2}}, 0x48) (async) 12:55:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x8cffffff00000000) 12:55:57 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x58000000}, 0x1c) 12:55:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 77) 12:55:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x80000000000) 12:55:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x2b, 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYRES64=r6, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="ee56555cfee67849e5e2209ca1f5a64c69e9df8d338d8a7907a3714891b866fc301b04704bc622d0d508288583120e4e80cd060ccb29a22f4572737416030f89e751bfe740ee3043edfeea0d8e4b2ddca9fd4798c016253fc343c7c9ee8d436d6842b9fa471e424842cda1a4312b85856e2286356fcbdcb796f866c7305f56cd", @ANYRES64=r5], 0x1a78) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r7) r8 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="2c7cc3646e6fbf3ccb46774b488a044ba361b26b84", @ANYRESHEX=r8, @ANYBLOB=',\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xfffffffa, @local, 0x4}, {0xa, 0x4e24, 0x81, @loopback, 0x7fff}, r9, 0x2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast1, 0x200}, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, r3, 0x2}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r5) (async) socket(0x2b, 0x1, 0x0) (async) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYRES64=r6, @ANYBLOB="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", @ANYRESDEC=r6, @ANYBLOB="ee56555cfee67849e5e2209ca1f5a64c69e9df8d338d8a7907a3714891b866fc301b04704bc622d0d508288583120e4e80cd060ccb29a22f4572737416030f89e751bfe740ee3043edfeea0d8e4b2ddca9fd4798c016253fc343c7c9ee8d436d6842b9fa471e424842cda1a4312b85856e2286356fcbdcb796f866c7305f56cd", @ANYRES64=r5], 0x1a78) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r7) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB="2c7cc3646e6fbf3ccb46774b488a044ba361b26b84", @ANYRESHEX=r8, @ANYBLOB=',\x00']) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x111, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xfffffffa, @local, 0x4}, {0xa, 0x4e24, 0x81, @loopback, 0x7fff}, r9, 0x2}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @mcast1, 0x200}, {0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, r3, 0x2}}, 0x48) (async) [ 1108.284544][T18516] 9pnet_fd: Insufficient options for proto=fd [ 1108.315835][T18518] loop2: detected capacity change from 0 to 545 [ 1108.343467][T18523] loop4: detected capacity change from 0 to 545 [ 1108.345066][T18525] loop5: detected capacity change from 0 to 545 [ 1108.355536][T18523] FAULT_INJECTION: forcing a failure. [ 1108.355536][T18523] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.358408][T18526] 9pnet_fd: Insufficient options for proto=fd [ 1108.368713][T18523] CPU: 0 PID: 18523 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1108.385772][T18523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.395875][T18523] Call Trace: [ 1108.399145][T18523] [ 1108.402077][T18523] dump_stack_lvl+0xd6/0x122 [ 1108.406657][T18523] dump_stack+0x11/0x1b [ 1108.410808][T18523] should_fail+0x23c/0x250 [ 1108.415212][T18523] ? __list_lru_init+0x352/0x6d0 [ 1108.420187][T18523] __should_failslab+0x81/0x90 [ 1108.425009][T18523] should_failslab+0x5/0x20 [ 1108.429538][T18523] kmem_cache_alloc_trace+0x52/0x350 [ 1108.434824][T18523] __list_lru_init+0x352/0x6d0 [ 1108.439574][T18523] alloc_super+0x479/0x510 [ 1108.443979][T18523] ? get_tree_bdev+0x3d0/0x3d0 [ 1108.448814][T18523] sget_fc+0x1b3/0x450 [ 1108.452933][T18523] ? test_bdev_super_fc+0x40/0x40 [ 1108.457943][T18523] get_tree_bdev+0x1c2/0x3d0 [ 1108.462529][T18523] ? note_qf_name+0x140/0x140 [ 1108.467209][T18523] vfs_get_tree+0x4a/0x1a0 [ 1108.471613][T18523] path_mount+0x11cf/0x1c40 [ 1108.476101][T18523] ? kmem_cache_free+0x65/0x110 [ 1108.480938][T18523] __se_sys_mount+0x24b/0x2f0 [ 1108.485658][T18523] __x64_sys_mount+0x63/0x70 [ 1108.490285][T18523] do_syscall_64+0x44/0xd0 [ 1108.494769][T18523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.500675][T18523] RIP: 0033:0x7f533ffa557a [ 1108.505125][T18523] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1108.525755][T18523] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.534172][T18523] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a 12:55:58 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x97ffffff00000000) [ 1108.542129][T18523] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1108.550093][T18523] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1108.558100][T18523] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1108.566053][T18523] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1108.574065][T18523] 12:55:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7ff}, @ib={0x1b, 0x2, 0x0, {}, 0x0, 0x4}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 12:55:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000) 12:55:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7ff}, @ib={0x1b, 0x2, 0x0, {}, 0x0, 0x4}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7ff}, @ib={0x1b, 0x2, 0x0, {}, 0x0, 0x4}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) (async) [ 1108.591768][T18531] loop2: detected capacity change from 0 to 545 12:55:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 78) [ 1108.658404][T18542] loop5: detected capacity change from 0 to 545 [ 1108.670685][T18544] loop4: detected capacity change from 0 to 545 [ 1108.679675][T18544] FAULT_INJECTION: forcing a failure. [ 1108.679675][T18544] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.692325][T18544] CPU: 0 PID: 18544 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1108.703350][T18544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.713401][T18544] Call Trace: [ 1108.716748][T18544] [ 1108.719672][T18544] dump_stack_lvl+0xd6/0x122 [ 1108.724267][T18544] dump_stack+0x11/0x1b [ 1108.728422][T18544] should_fail+0x23c/0x250 [ 1108.732837][T18544] ? __list_lru_init+0x352/0x6d0 [ 1108.737778][T18544] __should_failslab+0x81/0x90 [ 1108.742635][T18544] should_failslab+0x5/0x20 [ 1108.747141][T18544] kmem_cache_alloc_trace+0x52/0x350 [ 1108.752453][T18544] ? __list_lru_init+0x352/0x6d0 [ 1108.757410][T18544] __list_lru_init+0x352/0x6d0 [ 1108.762249][T18544] alloc_super+0x479/0x510 [ 1108.766674][T18544] ? get_tree_bdev+0x3d0/0x3d0 [ 1108.771453][T18544] sget_fc+0x1b3/0x450 [ 1108.775591][T18544] ? test_bdev_super_fc+0x40/0x40 [ 1108.780714][T18544] get_tree_bdev+0x1c2/0x3d0 [ 1108.785383][T18544] ? note_qf_name+0x140/0x140 [ 1108.790069][T18544] vfs_get_tree+0x4a/0x1a0 [ 1108.794482][T18544] path_mount+0x11cf/0x1c40 [ 1108.798996][T18544] ? kmem_cache_free+0x65/0x110 [ 1108.803856][T18544] __se_sys_mount+0x24b/0x2f0 [ 1108.808535][T18544] ? __this_cpu_preempt_check+0x18/0x20 [ 1108.814083][T18544] __x64_sys_mount+0x63/0x70 [ 1108.818673][T18544] do_syscall_64+0x44/0xd0 [ 1108.823111][T18544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1108.829092][T18544] RIP: 0033:0x7f533ffa557a [ 1108.833507][T18544] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1108.853115][T18544] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1108.861702][T18544] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1108.869819][T18544] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1108.877789][T18544] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1108.885802][T18544] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1108.893784][T18544] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1108.901758][T18544] 12:55:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7ff}, @ib={0x1b, 0x2, 0x0, {}, 0x0, 0x4}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in6={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7ff}, @ib={0x1b, 0x2, 0x0, {}, 0x0, 0x4}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 12:55:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x2) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:55:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000) [ 1109.128810][T18550] loop5: detected capacity change from 0 to 545 12:55:58 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x60000000}, 0x1c) 12:55:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 79) 12:55:58 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x9e05000000000000) 12:55:58 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r2, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x10b}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = pidfd_getfd(0xffffffffffffffff, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r3}}, 0x128) 12:55:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000) 12:55:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x3, @local, 0xdd3e}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x380080, @empty}, 0x1c) [ 1109.207573][T18567] loop2: detected capacity change from 0 to 545 [ 1109.209349][T18569] loop5: detected capacity change from 0 to 545 [ 1109.220603][T18570] loop4: detected capacity change from 0 to 545 [ 1109.227395][T18570] FAULT_INJECTION: forcing a failure. [ 1109.227395][T18570] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.240005][T18570] CPU: 1 PID: 18570 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1109.251027][T18570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.261076][T18570] Call Trace: [ 1109.264350][T18570] [ 1109.267276][T18570] dump_stack_lvl+0xd6/0x122 [ 1109.271871][T18570] dump_stack+0x11/0x1b [ 1109.276109][T18570] should_fail+0x23c/0x250 [ 1109.280563][T18570] ? __list_lru_init+0x352/0x6d0 [ 1109.285617][T18570] __should_failslab+0x81/0x90 [ 1109.290386][T18570] should_failslab+0x5/0x20 [ 1109.294965][T18570] kmem_cache_alloc_trace+0x52/0x350 [ 1109.300302][T18570] ? __list_lru_init+0x352/0x6d0 [ 1109.305238][T18570] __list_lru_init+0x352/0x6d0 [ 1109.310071][T18570] alloc_super+0x479/0x510 [ 1109.314505][T18570] ? get_tree_bdev+0x3d0/0x3d0 [ 1109.319390][T18570] sget_fc+0x1b3/0x450 [ 1109.323462][T18570] ? test_bdev_super_fc+0x40/0x40 [ 1109.328490][T18570] get_tree_bdev+0x1c2/0x3d0 [ 1109.333099][T18570] ? note_qf_name+0x140/0x140 [ 1109.337860][T18570] vfs_get_tree+0x4a/0x1a0 [ 1109.342312][T18570] path_mount+0x11cf/0x1c40 [ 1109.346835][T18570] ? kmem_cache_free+0x65/0x110 [ 1109.351684][T18570] __se_sys_mount+0x24b/0x2f0 [ 1109.356389][T18570] __x64_sys_mount+0x63/0x70 [ 1109.360979][T18570] do_syscall_64+0x44/0xd0 [ 1109.365399][T18570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1109.371319][T18570] RIP: 0033:0x7f533ffa557a [ 1109.375727][T18570] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1109.395353][T18570] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:55:58 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r2, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x10b}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = pidfd_getfd(0xffffffffffffffff, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r3}}, 0x128) 12:55:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (rerun: 32) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x3, @local, 0xdd3e}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x380080, @empty}, 0x1c) 12:55:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7ffffffffffff) [ 1109.403774][T18570] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1109.411817][T18570] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1109.419786][T18570] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1109.427779][T18570] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1109.435751][T18570] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1109.443718][T18570] 12:55:59 executing program 3: socket$isdn_base(0x22, 0x3, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r2, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x10b}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = pidfd_getfd(0xffffffffffffffff, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000480)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r3}}, 0x128) 12:55:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (rerun: 32) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x3, @local, 0xdd3e}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x380080, @empty}, 0x1c) 12:55:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc405000000000000) [ 1109.534950][T18595] loop2: detected capacity change from 0 to 545 [ 1109.541808][T18597] loop5: detected capacity change from 0 to 545 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x10200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 12:55:59 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0x8dffffff}, 0x1c) 12:55:59 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x4, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) socket$inet6(0xa, 0x3, 0x351) socket$netlink(0x10, 0x3, 0x5) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 80) 12:55:59 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xa000000000000) 12:55:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf4ffffff00000000) 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x10200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) [ 1110.066549][T18605] loop2: detected capacity change from 0 to 545 [ 1110.074800][T18609] loop5: detected capacity change from 0 to 545 [ 1110.079162][T18612] loop4: detected capacity change from 0 to 545 [ 1110.095263][T18612] FAULT_INJECTION: forcing a failure. [ 1110.095263][T18612] name failslab, interval 1, probability 0, space 0, times 0 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x10200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x0, "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"}, r1}}, 0x128) [ 1110.107996][T18612] CPU: 1 PID: 18612 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1110.119123][T18612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.129269][T18612] Call Trace: [ 1110.132544][T18612] [ 1110.135485][T18612] dump_stack_lvl+0xd6/0x122 [ 1110.140130][T18612] dump_stack+0x11/0x1b [ 1110.144291][T18612] should_fail+0x23c/0x250 [ 1110.148716][T18612] ? __list_lru_init+0x352/0x6d0 [ 1110.153656][T18612] __should_failslab+0x81/0x90 [ 1110.158464][T18612] should_failslab+0x5/0x20 12:55:59 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) (async) r1 = socket$inet6(0xa, 0x4, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) socket$inet6(0xa, 0x3, 0x351) (async) socket$netlink(0x10, 0x3, 0x5) (async) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) 12:55:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x0, "8e98d0c0f61b2625ba4c18ce9ea531015954745171754714cc00fd3f665ad0ddb680956626c02696fe1cb62578e6acfb8ec7005077cb0a684da682f3ac2ea5bfa91b1b816b233b7fffbb47e1361658b61925da688aadaa46e4c7f6cef09616bade232448501886ae42e6a93816c6c4ac6957ad9930f9facc1fa12a0318871ddc6cbfe2b39a9744adbb5f181500c906003a086cf6b8dbc9dd321c57c4529320492db03c061bc906984da016f1a7cc893882aca7e42e1b29b9a75d8f02ef1bdcf998c4238fcd3d8ddffb4110c39ff145e5896f5898f3041655eff9ca7217f42b84128e68a81d9b1d62747cd1ece1d9bc12ffd1cccd53d3b7ba737d01649f120e83"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x0, "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"}, r1}}, 0x128) (async) [ 1110.162968][T18612] kmem_cache_alloc_trace+0x52/0x350 [ 1110.168258][T18612] ? __list_lru_init+0x352/0x6d0 [ 1110.173239][T18612] __list_lru_init+0x352/0x6d0 [ 1110.178054][T18612] alloc_super+0x479/0x510 [ 1110.182545][T18612] ? get_tree_bdev+0x3d0/0x3d0 [ 1110.187322][T18612] sget_fc+0x1b3/0x450 [ 1110.191400][T18612] ? test_bdev_super_fc+0x40/0x40 [ 1110.196508][T18612] get_tree_bdev+0x1c2/0x3d0 [ 1110.201103][T18612] ? note_qf_name+0x140/0x140 [ 1110.205882][T18612] vfs_get_tree+0x4a/0x1a0 [ 1110.210296][T18612] path_mount+0x11cf/0x1c40 12:55:59 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x4, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) socket$inet6(0xa, 0x3, 0x351) socket$netlink(0x10, 0x3, 0x5) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) (async) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) (async) socket$inet6(0xa, 0x4, 0x6) (async) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) socket$inet6(0xa, 0x3, 0x351) (async) socket$netlink(0x10, 0x3, 0x5) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) [ 1110.214873][T18612] ? kmem_cache_free+0x65/0x110 [ 1110.219729][T18612] __se_sys_mount+0x24b/0x2f0 [ 1110.224410][T18612] __x64_sys_mount+0x63/0x70 [ 1110.229003][T18612] do_syscall_64+0x44/0xd0 [ 1110.233436][T18612] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1110.239408][T18612] RIP: 0033:0x7f533ffa557a [ 1110.243820][T18612] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1110.263430][T18612] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1110.271910][T18612] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1110.279879][T18612] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1110.287849][T18612] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1110.295820][T18612] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1110.303791][T18612] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1110.311767][T18612] 12:56:00 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xc05d0000}, 0x1c) 12:56:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x84c583bb) 12:56:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x20, 0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x10, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @private2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:00 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf6ffffff00000000) 12:56:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x100000000000000) 12:56:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 81) [ 1110.923814][T18664] loop2: detected capacity change from 0 to 545 [ 1110.924765][T18665] loop4: detected capacity change from 0 to 545 [ 1110.938291][T18668] loop5: detected capacity change from 0 to 545 [ 1110.944921][T18665] FAULT_INJECTION: forcing a failure. [ 1110.944921][T18665] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.957566][T18665] CPU: 1 PID: 18665 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1110.968592][T18665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.978644][T18665] Call Trace: [ 1110.981915][T18665] [ 1110.984449][T18673] 9pnet_fd: Insufficient options for proto=fd [ 1110.984839][T18665] dump_stack_lvl+0xd6/0x122 [ 1110.995463][T18665] dump_stack+0x11/0x1b [ 1110.999616][T18665] should_fail+0x23c/0x250 [ 1111.004033][T18665] ? __list_lru_init+0x352/0x6d0 [ 1111.008975][T18665] __should_failslab+0x81/0x90 [ 1111.013837][T18665] should_failslab+0x5/0x20 [ 1111.018383][T18665] kmem_cache_alloc_trace+0x52/0x350 [ 1111.023709][T18665] ? __list_lru_init+0x352/0x6d0 [ 1111.028646][T18665] __list_lru_init+0x352/0x6d0 [ 1111.033418][T18665] alloc_super+0x479/0x510 [ 1111.037825][T18665] ? get_tree_bdev+0x3d0/0x3d0 [ 1111.042582][T18665] sget_fc+0x1b3/0x450 [ 1111.046642][T18665] ? test_bdev_super_fc+0x40/0x40 [ 1111.051728][T18665] get_tree_bdev+0x1c2/0x3d0 [ 1111.056311][T18665] ? note_qf_name+0x140/0x140 [ 1111.061064][T18665] vfs_get_tree+0x4a/0x1a0 [ 1111.065486][T18665] path_mount+0x11cf/0x1c40 [ 1111.069973][T18665] ? kmem_cache_free+0x65/0x110 [ 1111.074811][T18665] __se_sys_mount+0x24b/0x2f0 [ 1111.079476][T18665] ? __this_cpu_preempt_check+0x18/0x20 [ 1111.085098][T18665] __x64_sys_mount+0x63/0x70 [ 1111.089720][T18665] do_syscall_64+0x44/0xd0 [ 1111.094123][T18665] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1111.100007][T18665] RIP: 0033:0x7f533ffa557a [ 1111.104404][T18665] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1111.124063][T18665] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1111.132465][T18665] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1111.140421][T18665] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1111.148429][T18665] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1111.156451][T18665] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1111.164406][T18665] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 12:56:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) (rerun: 32) close(r1) (async, rerun: 64) r2 = socket(0x25, 0x1, 0x0) (rerun: 64) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x84c583bb) 12:56:00 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfbffffff00000000) 12:56:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x200000000000000) [ 1111.172398][T18665] 12:56:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 82) [ 1111.256686][T18682] loop2: detected capacity change from 0 to 545 [ 1111.265046][T18684] loop5: detected capacity change from 0 to 545 [ 1111.276526][T18686] loop4: detected capacity change from 0 to 545 [ 1111.289288][T18686] FAULT_INJECTION: forcing a failure. [ 1111.289288][T18686] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.301941][T18686] CPU: 0 PID: 18686 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1111.313007][T18686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.323056][T18686] Call Trace: [ 1111.326323][T18686] [ 1111.329268][T18686] dump_stack_lvl+0xd6/0x122 [ 1111.333864][T18686] dump_stack+0x11/0x1b [ 1111.338017][T18686] should_fail+0x23c/0x250 [ 1111.342431][T18686] ? __list_lru_init+0x352/0x6d0 [ 1111.347368][T18686] __should_failslab+0x81/0x90 [ 1111.352267][T18686] should_failslab+0x5/0x20 [ 1111.356792][T18686] kmem_cache_alloc_trace+0x52/0x350 [ 1111.362082][T18686] ? __list_lru_init+0x352/0x6d0 [ 1111.367021][T18686] __list_lru_init+0x352/0x6d0 [ 1111.371789][T18686] alloc_super+0x479/0x510 [ 1111.376302][T18686] ? get_tree_bdev+0x3d0/0x3d0 [ 1111.381086][T18686] sget_fc+0x1b3/0x450 [ 1111.385155][T18686] ? test_bdev_super_fc+0x40/0x40 [ 1111.390183][T18686] get_tree_bdev+0x1c2/0x3d0 [ 1111.394829][T18686] ? note_qf_name+0x140/0x140 [ 1111.399598][T18686] vfs_get_tree+0x4a/0x1a0 [ 1111.404118][T18686] path_mount+0x11cf/0x1c40 [ 1111.408730][T18686] ? kmem_cache_free+0x65/0x110 [ 1111.413638][T18686] __se_sys_mount+0x24b/0x2f0 [ 1111.418319][T18686] ? __this_cpu_preempt_check+0x18/0x20 [ 1111.423875][T18686] __x64_sys_mount+0x63/0x70 [ 1111.428516][T18686] do_syscall_64+0x44/0xd0 [ 1111.433015][T18686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1111.438907][T18686] RIP: 0033:0x7f533ffa557a [ 1111.443329][T18686] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1111.462934][T18686] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1111.471352][T18686] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1111.479320][T18686] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1111.487327][T18686] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1111.495285][T18686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 12:56:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x84c583bb) 12:56:01 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x204000000000000) [ 1111.503252][T18686] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1111.511287][T18686] [ 1111.587357][T18697] loop5: detected capacity change from 0 to 545 12:56:01 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xe0ffffff}, 0x1c) 12:56:01 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfdffffff00000000) 12:56:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 83) 12:56:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = memfd_secret(0x0) getpeername$l2tp(r2, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="000000bba4fbf2", @ANYRESHEX=r3, @ANYBLOB="2c007e85c48972d9f2c11b591e4f99523d1cb13e740150b1eb66244135a01a03dcfed8407667843e0b28073e0272e24a39ec33640f10c3a4b9d8a1938ab8baf36da08403e5ca6fc73aea000fc0a95798fbb377510c5c8b91e21387b3bce9fb4976503c4e6ea41bfcfd7e09e6ad5e78bf0a66d1b6e2b2a691cf87e69ced18e3619d86d48ec8ecb82a9e91c7fa6289b3b70f2049a3fd05b3455300e35617029055db59e6ef9eedddfa868f9f8042e67b78d9a2a48718974881c2d57e932c74e0bcc3590f7cf9a9e6e1640a028ee524a46b"]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000007c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x5, 0x0, [0x7f, 0x6e5, 0x10, 0x80, 0x53, 0x7ff, 0x80, 0x8, 0x3ff, 0x9, 0x5, 0x2, 0x487d, 0x5ad, 0x80000001, 0x40]}, {0x28, 0x0, [0x10000, 0x3, 0x6, 0x3, 0x2, 0x7, 0x401, 0x4, 0xe8, 0x88, 0x81, 0x8, 0x5, 0x3, 0x6d09989e, 0x1]}, {0x20, 0x0, [0xfffffffb, 0x2, 0x80000000, 0x8, 0x7ff, 0x2, 0x2, 0x1f, 0xb447, 0x80000001, 0x1, 0x3, 0x77, 0x7fff, 0x3ff, 0x6]}], r5, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r4}}, 0x128) 12:56:01 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x300000000000000) 12:56:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x20, 0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x10, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @private2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) (async) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x20, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r5) (async) socket(0x10, 0x4, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) (async) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}, 0x1c) (async) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @private2}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) [ 1111.796293][T18704] loop5: detected capacity change from 0 to 545 [ 1111.796410][T18705] loop2: detected capacity change from 0 to 545 [ 1111.811124][T18702] 9pnet_fd: Insufficient options for proto=fd 12:56:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = memfd_secret(0x0) getpeername$l2tp(r2, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="000000bba4fbf2", @ANYRESHEX=r3, @ANYBLOB="2c007e85c48972d9f2c11b591e4f99523d1cb13e740150b1eb66244135a01a03dcfed8407667843e0b28073e0272e24a39ec33640f10c3a4b9d8a1938ab8baf36da08403e5ca6fc73aea000fc0a95798fbb377510c5c8b91e21387b3bce9fb4976503c4e6ea41bfcfd7e09e6ad5e78bf0a66d1b6e2b2a691cf87e69ced18e3619d86d48ec8ecb82a9e91c7fa6289b3b70f2049a3fd05b3455300e35617029055db59e6ef9eedddfa868f9f8042e67b78d9a2a48718974881c2d57e932c74e0bcc3590f7cf9a9e6e1640a028ee524a46b"]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000007c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x5, 0x0, [0x7f, 0x6e5, 0x10, 0x80, 0x53, 0x7ff, 0x80, 0x8, 0x3ff, 0x9, 0x5, 0x2, 0x487d, 0x5ad, 0x80000001, 0x40]}, {0x28, 0x0, [0x10000, 0x3, 0x6, 0x3, 0x2, 0x7, 0x401, 0x4, 0xe8, 0x88, 0x81, 0x8, 0x5, 0x3, 0x6d09989e, 0x1]}, {0x20, 0x0, [0xfffffffb, 0x2, 0x80000000, 0x8, 0x7ff, 0x2, 0x2, 0x1f, 0xb447, 0x80000001, 0x1, 0x3, 0x77, 0x7fff, 0x3ff, 0x6]}], r5, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r4}}, 0x128) [ 1111.837412][T18712] loop4: detected capacity change from 0 to 545 [ 1111.846569][T18712] FAULT_INJECTION: forcing a failure. [ 1111.846569][T18712] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.859299][T18712] CPU: 1 PID: 18712 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1111.870323][T18712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.875984][T18713] 9pnet_fd: Insufficient options for proto=fd [ 1111.880394][T18712] Call Trace: [ 1111.880402][T18712] [ 1111.880408][T18712] dump_stack_lvl+0xd6/0x122 [ 1111.893159][T18717] 9pnet_fd: Insufficient options for proto=fd [ 1111.897268][T18712] dump_stack+0x11/0x1b [ 1111.907461][T18712] should_fail+0x23c/0x250 [ 1111.911875][T18712] ? __list_lru_init+0x352/0x6d0 [ 1111.916809][T18712] __should_failslab+0x81/0x90 [ 1111.921578][T18712] should_failslab+0x5/0x20 [ 1111.926181][T18712] kmem_cache_alloc_trace+0x52/0x350 [ 1111.931495][T18712] ? __list_lru_init+0x352/0x6d0 [ 1111.936482][T18712] __list_lru_init+0x352/0x6d0 [ 1111.941254][T18712] alloc_super+0x479/0x510 [ 1111.945736][T18712] ? get_tree_bdev+0x3d0/0x3d0 [ 1111.950535][T18712] sget_fc+0x1b3/0x450 [ 1111.954671][T18712] ? test_bdev_super_fc+0x40/0x40 [ 1111.959736][T18712] get_tree_bdev+0x1c2/0x3d0 [ 1111.964384][T18712] ? note_qf_name+0x140/0x140 [ 1111.969066][T18712] vfs_get_tree+0x4a/0x1a0 [ 1111.973520][T18712] path_mount+0x11cf/0x1c40 [ 1111.978128][T18712] ? kmem_cache_free+0x65/0x110 [ 1111.983052][T18712] __se_sys_mount+0x24b/0x2f0 [ 1111.987785][T18712] __x64_sys_mount+0x63/0x70 [ 1111.992418][T18712] do_syscall_64+0x44/0xd0 [ 1111.996835][T18712] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1112.002778][T18712] RIP: 0033:0x7f533ffa557a [ 1112.007213][T18712] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1112.026906][T18712] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.035393][T18712] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1112.043429][T18712] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1112.051419][T18712] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1112.059390][T18712] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1112.067364][T18712] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1112.075332][T18712] 12:56:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x20, 0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x10, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}, 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @private2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) accept$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c) (async) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000000)=0x20, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r5) (async) socket(0x10, 0x4, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) (async) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x10001}, 0x1c) (async) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @private2}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:56:01 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x400000000000000) [ 1112.084089][T18729] 9pnet_fd: Insufficient options for proto=fd 12:56:01 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfeffffff00000000) 12:56:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 84) 12:56:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = memfd_secret(0x0) getpeername$l2tp(r2, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f0000000480)=0x10) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="000000bba4fbf2", @ANYRESHEX=r3, @ANYBLOB="2c007e85c48972d9f2c11b591e4f99523d1cb13e740150b1eb66244135a01a03dcfed8407667843e0b28073e0272e24a39ec33640f10c3a4b9d8a1938ab8baf36da08403e5ca6fc73aea000fc0a95798fbb377510c5c8b91e21387b3bce9fb4976503c4e6ea41bfcfd7e09e6ad5e78bf0a66d1b6e2b2a691cf87e69ced18e3619d86d48ec8ecb82a9e91c7fa6289b3b70f2049a3fd05b3455300e35617029055db59e6ef9eedddfa868f9f8042e67b78d9a2a48718974881c2d57e932c74e0bcc3590f7cf9a9e6e1640a028ee524a46b"]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000007c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000680)=[{0x5, 0x0, [0x7f, 0x6e5, 0x10, 0x80, 0x53, 0x7ff, 0x80, 0x8, 0x3ff, 0x9, 0x5, 0x2, 0x487d, 0x5ad, 0x80000001, 0x40]}, {0x28, 0x0, [0x10000, 0x3, 0x6, 0x3, 0x2, 0x7, 0x401, 0x4, 0xe8, 0x88, 0x81, 0x8, 0x5, 0x3, 0x6d09989e, 0x1]}, {0x20, 0x0, [0xfffffffb, 0x2, 0x80000000, 0x8, 0x7ff, 0x2, 0x2, 0x1f, 0xb447, 0x80000001, 0x1, 0x3, 0x77, 0x7fff, 0x3ff, 0x6]}], r5, 0x1, 0x1, 0xd8}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r4}}, 0x128) (rerun: 64) [ 1112.115012][T18735] loop5: detected capacity change from 0 to 545 [ 1112.133495][T18737] loop2: detected capacity change from 0 to 545 [ 1112.145839][T18739] loop4: detected capacity change from 0 to 545 [ 1112.154769][T18742] 9pnet_fd: Insufficient options for proto=fd [ 1112.160372][T18739] FAULT_INJECTION: forcing a failure. [ 1112.160372][T18739] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.173419][T18739] CPU: 1 PID: 18739 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1112.184493][T18739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.184506][T18739] Call Trace: [ 1112.184514][T18739] [ 1112.184520][T18739] dump_stack_lvl+0xd6/0x122 [ 1112.205374][T18739] dump_stack+0x11/0x1b [ 1112.209569][T18739] should_fail+0x23c/0x250 [ 1112.213998][T18739] ? __list_lru_init+0x352/0x6d0 [ 1112.218981][T18739] __should_failslab+0x81/0x90 [ 1112.223849][T18739] should_failslab+0x5/0x20 [ 1112.228397][T18739] kmem_cache_alloc_trace+0x52/0x350 [ 1112.233706][T18739] ? __list_lru_init+0x352/0x6d0 [ 1112.238763][T18739] __list_lru_init+0x352/0x6d0 [ 1112.243618][T18739] alloc_super+0x479/0x510 [ 1112.248038][T18739] ? get_tree_bdev+0x3d0/0x3d0 [ 1112.252873][T18739] sget_fc+0x1b3/0x450 [ 1112.256944][T18739] ? test_bdev_super_fc+0x40/0x40 [ 1112.261991][T18739] get_tree_bdev+0x1c2/0x3d0 [ 1112.266653][T18739] ? note_qf_name+0x140/0x140 [ 1112.271397][T18739] vfs_get_tree+0x4a/0x1a0 [ 1112.275817][T18739] path_mount+0x11cf/0x1c40 [ 1112.280323][T18739] ? kmem_cache_free+0x65/0x110 [ 1112.285186][T18739] __se_sys_mount+0x24b/0x2f0 [ 1112.289869][T18739] __x64_sys_mount+0x63/0x70 [ 1112.294461][T18739] do_syscall_64+0x44/0xd0 [ 1112.298877][T18739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1112.304769][T18739] RIP: 0033:0x7f533ffa557a [ 1112.309174][T18739] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1112.328788][T18739] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.337204][T18739] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1112.345205][T18739] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1112.353176][T18739] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1112.361147][T18739] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1112.369144][T18739] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1112.377120][T18739] [ 1112.383702][T18746] 9pnet_fd: Insufficient options for proto=fd [ 1112.409688][T18747] 9pnet_fd: Insufficient options for proto=fd 12:56:02 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xf5ffffff}, 0x1c) 12:56:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x6, @mcast1, 0x3}, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000}, 0xffffffffffffffff, 0x8000}}, 0x48) r3 = socket$qrtr(0x2a, 0x2, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r3, 0x5000940e, &(0x7f0000000680)={{r4}, "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"}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r6}}, 0x128) 12:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:02 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x500000000000000) 12:56:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 85) 12:56:02 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfeffffffffffffff) 12:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast2}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) [ 1112.673285][T18757] loop4: detected capacity change from 0 to 545 [ 1112.680839][T18762] loop2: detected capacity change from 0 to 545 [ 1112.687501][T18764] loop5: detected capacity change from 0 to 545 [ 1112.704984][T18757] FAULT_INJECTION: forcing a failure. [ 1112.704984][T18757] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.717698][T18757] CPU: 1 PID: 18757 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1112.722200][T18764] EXT4-fs mount: 71 callbacks suppressed [ 1112.722213][T18764] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1112.728723][T18757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.728737][T18757] Call Trace: [ 1112.728743][T18757] [ 1112.759062][T18757] dump_stack_lvl+0xd6/0x122 [ 1112.763657][T18757] dump_stack+0x11/0x1b [ 1112.767885][T18757] should_fail+0x23c/0x250 12:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x1, @mcast2}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1112.772305][T18757] ? __list_lru_init+0x352/0x6d0 [ 1112.777262][T18757] __should_failslab+0x81/0x90 [ 1112.782035][T18757] should_failslab+0x5/0x20 [ 1112.786545][T18757] kmem_cache_alloc_trace+0x52/0x350 [ 1112.791835][T18757] ? __list_lru_init+0x352/0x6d0 [ 1112.796817][T18757] __list_lru_init+0x352/0x6d0 [ 1112.801580][T18757] alloc_super+0x479/0x510 [ 1112.806003][T18757] ? get_tree_bdev+0x3d0/0x3d0 [ 1112.810863][T18757] sget_fc+0x1b3/0x450 [ 1112.811969][T18762] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1112.814970][T18757] ? test_bdev_super_fc+0x40/0x40 [ 1112.814997][T18757] get_tree_bdev+0x1c2/0x3d0 [ 1112.833041][T18757] ? note_qf_name+0x140/0x140 [ 1112.837723][T18757] vfs_get_tree+0x4a/0x1a0 [ 1112.842142][T18757] path_mount+0x11cf/0x1c40 [ 1112.846650][T18757] ? kmem_cache_free+0x65/0x110 [ 1112.851543][T18757] __se_sys_mount+0x24b/0x2f0 [ 1112.856224][T18757] __x64_sys_mount+0x63/0x70 [ 1112.860815][T18757] do_syscall_64+0x44/0xd0 [ 1112.865295][T18757] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1112.871361][T18757] RIP: 0033:0x7f533ffa557a [ 1112.875770][T18757] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1112.895372][T18757] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1112.903859][T18757] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1112.911860][T18757] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 12:56:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x6, @mcast1, 0x3}, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000}, 0xffffffffffffffff, 0x8000}}, 0x48) (async) r3 = socket$qrtr(0x2a, 0x2, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE(r3, 0x5000940e, &(0x7f0000000680)={{r4}, "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"}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r6}}, 0x128) 12:56:02 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xff0f000000000000) [ 1112.919825][T18757] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1112.927833][T18757] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1112.935820][T18757] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1112.943794][T18757] 12:56:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x10000, @remote, 0x81}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x10380080, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3ff}, 0x1c) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000140)="0b23984cc27eff98252e40d3f619721050fece0ae2c7b0bcb10e5315d522d033b90cfb4c96e75cc3159e88632aaf410d79ae33671e9822fb5de6a624f33fc263b29687fee8a728d656eb9d58d5a3cce89800d5425b7ac8d1d6922c79", 0x5c}, {&(0x7f0000000200)="1f064adda44ed52b2d01ccaac57669bb1dbb7fb274c2a63b3857b59ae310b402e1fdfb33733c71e85da6e3326d0845b620cf763bbb880a8065d3da2a956279d2b7cb027823e51e280ac4c85e523b1727230e15ae48abad8748e9a1dd8565eca84fc609d1504a268c37", 0x69, 0x4}, {&(0x7f0000000280)="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", 0xfe, 0x5}, {&(0x7f0000000380)="d6c0fffff094ab9459b49b3fba3801e8dc5b2d48341f22d2acc0d41af61111f6784404bd79cbe66fa62ff434fa668764cf201c7730afc56ae844f18e6e345955763e8ca6b585a97077ec2d3d722dbd0a7419d5f754cbf9", 0x57, 0x46ae}, {&(0x7f0000000400)="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", 0x1000, 0x8000000000000000}, {&(0x7f0000001400)="02f01740f636d18b71b4336688f10ef44a5001ec74e555c1b535057ee6961b088b62c411a348df261454a7028975f9b09721323a1c49ec6f50dcadb2b164f9baec853bda411e9b5775e16d8f23b88534bbb43e2840caafd14aa9274defe951a8a6885016522bbe9d6bc1fb92fd9903de29792ea3fe00c498c21707409416df4cf09b8f46ffc870da1d16e82f2ba1ede0044650644a6957bd748d1896", 0x9c, 0x8}], 0x200080, &(0x7f0000001580)={[{@discard}, {@quota}, {@barrier}, {@dax}, {@delalloc}, {@noinit_itable}], [{@uid_lt}]}) 12:56:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 86) [ 1112.971010][ T24] audit: type=1400 audit(1646830562.469:518): avc: denied { ioctl } for pid=18780 comm="syz-executor.3" path="socket:[187322]" dev="sockfs" ino=187322 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1113.027253][T18788] loop2: detected capacity change from 0 to 545 [ 1113.037393][T18790] loop4: detected capacity change from 0 to 545 [ 1113.042744][T18788] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1113.055495][T18790] FAULT_INJECTION: forcing a failure. [ 1113.055495][T18790] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.068244][T18790] CPU: 1 PID: 18790 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1113.079262][T18790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.089319][T18790] Call Trace: [ 1113.092686][T18790] [ 1113.095614][T18790] dump_stack_lvl+0xd6/0x122 [ 1113.100230][T18790] dump_stack+0x11/0x1b [ 1113.104387][T18790] should_fail+0x23c/0x250 [ 1113.108804][T18790] ? __list_lru_init+0x70/0x6d0 [ 1113.113754][T18790] __should_failslab+0x81/0x90 [ 1113.118522][T18790] should_failslab+0x5/0x20 [ 1113.123029][T18790] __kmalloc+0x6f/0x370 [ 1113.127187][T18790] ? __list_lru_init+0x352/0x6d0 [ 1113.132141][T18790] __list_lru_init+0x70/0x6d0 [ 1113.136822][T18790] alloc_super+0x4a8/0x510 [ 1113.141241][T18790] ? get_tree_bdev+0x3d0/0x3d0 [ 1113.146027][T18790] sget_fc+0x1b3/0x450 [ 1113.150093][T18790] ? test_bdev_super_fc+0x40/0x40 [ 1113.155175][T18790] get_tree_bdev+0x1c2/0x3d0 [ 1113.159762][T18790] ? note_qf_name+0x140/0x140 [ 1113.164523][T18790] vfs_get_tree+0x4a/0x1a0 [ 1113.168946][T18790] path_mount+0x11cf/0x1c40 [ 1113.173450][T18790] ? kmem_cache_free+0x65/0x110 [ 1113.178357][T18790] __se_sys_mount+0x24b/0x2f0 [ 1113.183067][T18790] __x64_sys_mount+0x63/0x70 [ 1113.187659][T18790] do_syscall_64+0x44/0xd0 [ 1113.192136][T18790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1113.198116][T18790] RIP: 0033:0x7f533ffa557a [ 1113.202532][T18790] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1113.222157][T18790] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1113.230646][T18790] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1113.238699][T18790] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1113.246735][T18790] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1113.254792][T18790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1113.262765][T18790] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1113.270742][T18790] 12:56:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfc000000}, 0x1c) 12:56:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x600000000000000) 12:56:03 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffefffff00000000) 12:56:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 87) [ 1113.778072][T18794] loop5: detected capacity change from 0 to 545 [ 1113.784948][T18797] loop4: detected capacity change from 0 to 545 [ 1113.793438][T18799] loop2: detected capacity change from 0 to 545 [ 1113.800622][T18797] FAULT_INJECTION: forcing a failure. [ 1113.800622][T18797] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.813311][T18797] CPU: 1 PID: 18797 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1113.824346][T18797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.834402][T18797] Call Trace: [ 1113.834410][T18797] [ 1113.834416][T18797] dump_stack_lvl+0xd6/0x122 [ 1113.845188][T18797] dump_stack+0x11/0x1b [ 1113.849412][T18797] should_fail+0x23c/0x250 [ 1113.853827][T18797] __should_failslab+0x81/0x90 [ 1113.858594][T18797] should_failslab+0x5/0x20 [ 1113.863107][T18797] kmem_cache_alloc_node_trace+0x61/0x310 [ 1113.868865][T18797] ? __kmalloc_node+0x30/0x40 [ 1113.873549][T18797] __kmalloc_node+0x30/0x40 [ 1113.878073][T18797] kvmalloc_node+0x6d/0x100 [ 1113.882654][T18797] __list_lru_init+0x2f7/0x6d0 [ 1113.887411][T18797] alloc_super+0x4a8/0x510 [ 1113.891836][T18797] ? get_tree_bdev+0x3d0/0x3d0 [ 1113.896591][T18797] sget_fc+0x1b3/0x450 [ 1113.900645][T18797] ? test_bdev_super_fc+0x40/0x40 [ 1113.905659][T18797] get_tree_bdev+0x1c2/0x3d0 [ 1113.910325][T18797] ? note_qf_name+0x140/0x140 [ 1113.915060][T18797] vfs_get_tree+0x4a/0x1a0 [ 1113.919467][T18797] path_mount+0x11cf/0x1c40 [ 1113.923958][T18797] ? kmem_cache_free+0x65/0x110 [ 1113.928849][T18797] __se_sys_mount+0x24b/0x2f0 [ 1113.933542][T18797] __x64_sys_mount+0x63/0x70 [ 1113.938228][T18797] do_syscall_64+0x44/0xd0 [ 1113.942660][T18797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1113.948549][T18797] RIP: 0033:0x7f533ffa557a [ 1113.952947][T18797] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1113.972552][T18797] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1113.980978][T18797] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1113.988934][T18797] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1113.996886][T18797] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1114.004841][T18797] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1114.012825][T18797] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1114.020785][T18797] 12:56:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (rerun: 32) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x10000, @remote, 0x81}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x10380080, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3ff}, 0x1c) (async) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000140)="0b23984cc27eff98252e40d3f619721050fece0ae2c7b0bcb10e5315d522d033b90cfb4c96e75cc3159e88632aaf410d79ae33671e9822fb5de6a624f33fc263b29687fee8a728d656eb9d58d5a3cce89800d5425b7ac8d1d6922c79", 0x5c}, {&(0x7f0000000200)="1f064adda44ed52b2d01ccaac57669bb1dbb7fb274c2a63b3857b59ae310b402e1fdfb33733c71e85da6e3326d0845b620cf763bbb880a8065d3da2a956279d2b7cb027823e51e280ac4c85e523b1727230e15ae48abad8748e9a1dd8565eca84fc609d1504a268c37", 0x69, 0x4}, {&(0x7f0000000280)="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", 0xfe, 0x5}, {&(0x7f0000000380)="d6c0fffff094ab9459b49b3fba3801e8dc5b2d48341f22d2acc0d41af61111f6784404bd79cbe66fa62ff434fa668764cf201c7730afc56ae844f18e6e345955763e8ca6b585a97077ec2d3d722dbd0a7419d5f754cbf9", 0x57, 0x46ae}, {&(0x7f0000000400)="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", 0x1000, 0x8000000000000000}, {&(0x7f0000001400)="02f01740f636d18b71b4336688f10ef44a5001ec74e555c1b535057ee6961b088b62c411a348df261454a7028975f9b09721323a1c49ec6f50dcadb2b164f9baec853bda411e9b5775e16d8f23b88534bbb43e2840caafd14aa9274defe951a8a6885016522bbe9d6bc1fb92fd9903de29792ea3fe00c498c21707409416df4cf09b8f46ffc870da1d16e82f2ba1ede0044650644a6957bd748d1896", 0x9c, 0x8}], 0x200080, &(0x7f0000001580)={[{@discard}, {@quota}, {@barrier}, {@dax}, {@delalloc}, {@noinit_itable}], [{@uid_lt}]}) 12:56:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x6, @mcast1, 0x3}, {0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000}, 0xffffffffffffffff, 0x8000}}, 0x48) r3 = socket$qrtr(0x2a, 0x2, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r4) (async) r5 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE(r3, 0x5000940e, &(0x7f0000000680)={{r4}, "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"}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @remote}, @ib}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r6}}, 0x128) 12:56:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x604000000000000) 12:56:03 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 12:56:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 88) 12:56:03 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffff00000000) 12:56:03 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x3a) [ 1114.035676][T18794] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1114.055465][T18799] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1114.102824][T18815] loop4: detected capacity change from 0 to 545 [ 1114.109989][T18815] FAULT_INJECTION: forcing a failure. [ 1114.109989][T18815] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.122629][T18815] CPU: 0 PID: 18815 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1114.133656][T18815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.143712][T18815] Call Trace: [ 1114.146987][T18815] [ 1114.149914][T18815] dump_stack_lvl+0xd6/0x122 [ 1114.154528][T18815] dump_stack+0x11/0x1b [ 1114.158773][T18815] should_fail+0x23c/0x250 [ 1114.163197][T18815] ? __list_lru_init+0x352/0x6d0 [ 1114.168162][T18815] __should_failslab+0x81/0x90 [ 1114.173012][T18815] should_failslab+0x5/0x20 [ 1114.177615][T18815] kmem_cache_alloc_trace+0x52/0x350 [ 1114.182905][T18815] __list_lru_init+0x352/0x6d0 [ 1114.187674][T18815] alloc_super+0x4a8/0x510 [ 1114.192094][T18815] ? get_tree_bdev+0x3d0/0x3d0 [ 1114.196865][T18815] sget_fc+0x1b3/0x450 [ 1114.200929][T18815] ? test_bdev_super_fc+0x40/0x40 [ 1114.205959][T18815] get_tree_bdev+0x1c2/0x3d0 [ 1114.210634][T18815] ? note_qf_name+0x140/0x140 [ 1114.215317][T18815] vfs_get_tree+0x4a/0x1a0 [ 1114.219732][T18815] path_mount+0x11cf/0x1c40 [ 1114.224235][T18815] ? kmem_cache_free+0x65/0x110 [ 1114.229156][T18815] __se_sys_mount+0x24b/0x2f0 [ 1114.233990][T18815] ? __this_cpu_preempt_check+0x18/0x20 [ 1114.239539][T18815] __x64_sys_mount+0x63/0x70 [ 1114.244191][T18815] do_syscall_64+0x44/0xd0 [ 1114.248617][T18815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1114.254515][T18815] RIP: 0033:0x7f533ffa557a [ 1114.258982][T18815] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1114.278630][T18815] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1114.287044][T18815] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1114.295027][T18815] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1114.302996][T18815] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1114.310961][T18815] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1114.318940][T18815] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1114.326919][T18815] 12:56:03 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x204000, 0x1000}, 0x20) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) [ 1114.356405][T18821] loop2: detected capacity change from 0 to 545 [ 1114.359924][T18823] loop5: detected capacity change from 0 to 545 [ 1114.376464][T18821] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1114.392820][T18823] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:04 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfe800000}, 0x1c) 12:56:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 89) 12:56:04 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x12000) 12:56:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffffffff0700) [ 1114.647828][T18831] loop2: detected capacity change from 0 to 545 [ 1114.654586][ T24] audit: type=1400 audit(1646830564.149:519): avc: denied { read } for pid=18828 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1114.682360][T18836] loop4: detected capacity change from 0 to 545 [ 1114.689335][T18831] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1114.698786][T18836] FAULT_INJECTION: forcing a failure. [ 1114.698786][T18836] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.711521][T18836] CPU: 0 PID: 18836 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1114.722613][T18836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.732659][T18836] Call Trace: [ 1114.735929][T18836] [ 1114.738927][T18836] dump_stack_lvl+0xd6/0x122 [ 1114.743529][T18836] dump_stack+0x11/0x1b [ 1114.747686][T18836] should_fail+0x23c/0x250 [ 1114.752113][T18836] ? __list_lru_init+0x352/0x6d0 [ 1114.757046][T18836] __should_failslab+0x81/0x90 [ 1114.761814][T18836] should_failslab+0x5/0x20 [ 1114.766311][T18836] kmem_cache_alloc_trace+0x52/0x350 [ 1114.771629][T18836] ? __list_lru_init+0x352/0x6d0 [ 1114.776638][T18836] __list_lru_init+0x352/0x6d0 [ 1114.781429][T18836] alloc_super+0x4a8/0x510 [ 1114.785944][T18836] ? get_tree_bdev+0x3d0/0x3d0 [ 1114.790710][T18836] sget_fc+0x1b3/0x450 [ 1114.794822][T18836] ? test_bdev_super_fc+0x40/0x40 [ 1114.799908][T18836] get_tree_bdev+0x1c2/0x3d0 [ 1114.804552][T18836] ? note_qf_name+0x140/0x140 [ 1114.809282][T18836] vfs_get_tree+0x4a/0x1a0 [ 1114.813742][T18836] path_mount+0x11cf/0x1c40 [ 1114.818242][T18836] ? kmem_cache_free+0x65/0x110 [ 1114.823159][T18836] __se_sys_mount+0x24b/0x2f0 [ 1114.827833][T18836] ? __this_cpu_preempt_check+0x18/0x20 [ 1114.833386][T18836] __x64_sys_mount+0x63/0x70 [ 1114.837975][T18836] do_syscall_64+0x44/0xd0 [ 1114.842417][T18836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1114.848415][T18836] RIP: 0033:0x7f533ffa557a [ 1114.852820][T18836] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1114.872474][T18836] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1114.880879][T18836] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1114.888845][T18836] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 12:56:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x10000, @remote, 0x81}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x10380080, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3ff}, 0x1c) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000140)="0b23984cc27eff98252e40d3f619721050fece0ae2c7b0bcb10e5315d522d033b90cfb4c96e75cc3159e88632aaf410d79ae33671e9822fb5de6a624f33fc263b29687fee8a728d656eb9d58d5a3cce89800d5425b7ac8d1d6922c79", 0x5c}, {&(0x7f0000000200)="1f064adda44ed52b2d01ccaac57669bb1dbb7fb274c2a63b3857b59ae310b402e1fdfb33733c71e85da6e3326d0845b620cf763bbb880a8065d3da2a956279d2b7cb027823e51e280ac4c85e523b1727230e15ae48abad8748e9a1dd8565eca84fc609d1504a268c37", 0x69, 0x4}, {&(0x7f0000000280)="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", 0xfe, 0x5}, {&(0x7f0000000380)="d6c0fffff094ab9459b49b3fba3801e8dc5b2d48341f22d2acc0d41af61111f6784404bd79cbe66fa62ff434fa668764cf201c7730afc56ae844f18e6e345955763e8ca6b585a97077ec2d3d722dbd0a7419d5f754cbf9", 0x57, 0x46ae}, {&(0x7f0000000400)="70e12151a20553faa7a4e19dbd33791e8eff663202e96cc031eed907134ec3c4c9530eb0b5bddb05f7784f27f24fb247ac12ec5f307f02a5eedc4035d424ec65050a9dd00a7bb5bb521f82bc6bd3f8a2bdb78c4fce4e0927fbb8d17c38d81f46ac89b544ef6e2343ca7d6218b2ee56ba67d7932f0c7f36218449c4534568fab5658d6eeb635fa5eefff7b2edd866bcc983a308f1bbf37fddf41a553568c35ca28345c0722f9440255f9f58472adfc9bf1ea6e22302b3d90fd56ab5f5f389f25cc001225eb5844b7e78a01c6e34f715a14ec886d71d2286ce530249a8af3312576806190e342b579094b8974085a37c027637be44e14799756d2fed357837b3a8d673f14d8c02a8522f6e2b35a5278dd44028afcaa35eeef99a09d12fb1e7a7116fdaee2fbfd4d28c41d84c912f8b18bf969683ce5f8adc225845b9f6a9b1fcf7df2a066a33401b9cd3c961b283d2b873fd66df0dc4462efdd85d60dfc5f9a8d8ab4cbef4935ef7b38c60541bedeaf15961cae267fc5c19da14f2d78c9cb9c7728d55f6c333e263309a0962373156572f316564309423652e89609f7046f3bf49a69164dd4caf8819154f57d06f074bf21805d17cffeb5fd6e04f7bf0b348eecaaf81cac95a4ef5c75a60dd475e7d7507193b9dfb123a643de587d43455d24db6dc95bf03ee3ff9e5a4d6f64a5e177e00623f519d9a58a9f9eda76f3b975b647c0166cc69d83bfc34b42767ef1d5592e0f10a93132038c37d6c25803d2c1e6b9192b9f4953a4a8ee32d947058948007c389a089b49aa718c41aaf0ca5e7a6caa5654b1b2c3fd7760a5fcb7277001dcad1ee34f500f3cc0a66f8d565adcc913729541eb881121740d6a2bafa1e133f1736d7117fc1de001e29a165686869b1afbaad707a9725d86210526319c9db4f00738579b526433688510ddb3e375b1dbb5d3ace356eac49dfb74d0b1c0a443f967c0033e1332b56d684d1e6cb8fa88f4df87bcd49c0ea232e295443672edf0a0356a242b0d648907079101eb422b05933db958726015bb72864359874ad9b119bd15ae4867af76e1cee00fa0c5f0dbbb9014623b28131db7d089846ee9a1a601b8322e48ace1cb24ad29e691d5b7810b153e2146948986cb73b1d8994b53441bfba59199111b7c118e1e6773d208ba6d870caa2aebedff237ac7cb2ef914864a840dc2490fd74d84ce33a4d01ebaeb4c6a144df8281029c1e39d5240a0bd45a66775203e95cdf0110dbe073e9ac06ba518610c6413e95b18c5f01eef798f382714551303fda2201fbbb550c59c37bd846e09d8be4e9675ed35b1a6e8ec2091490b8c419dcfab5db46b815aeebe203ec1741c9bf277591220a62e42602b97a99e8afc25d35461d03fd421c2bcf04e7a67c90ac9805e4b9abc10b837256e57908896441f9b8ba25c0e6b1c4d508bba05a5a4263bfc2d3297f87323d57ca7c6759add207179fb16c91b15e571437a2e2092bca04edade41c1179a4337cb17bd9ee18cb8e7f107b82fca99dc2f1bde98781f89c4f191c8050b1a7bdb8ddc19c370aa73bb01c40491688eb2554eced87edade0a9a7a88d6938710d010ba23c1f404195b8acd7f3a2bac5198b5f5661372940ebf831469823a66ee43e6f50cc7e2d0d7eda279a7adce5ae75a70f0d93de3ebd27d7916d5c7fb1990c5b87c8845ae146a93415938bd7b571c5cc307f1b5b53413de4d77c9aee11f5b2e87210cdfe221b22ee5248810675b04bacc84d8e6b6a295495203df55a1f801350a635f5ab53e819010961bf481a41fdcee6c2a9b1023565c33377686503047834bde1e04cfa36d75b7544f2ed29ff03581909e6730bb45128a050d88ad59bbb05a1bf4216ace55fcd0db5c3f5758c8b8ac3e89f62d40cc9ad53b5816b33ab60df35379f58fb23535281d59314ee6d9fa7b8c53ccf57f10bed5e629d72249491846c438607e70830038e3176aa1c8344ac6b28feb530f29577cc15208b0e71003614f30b9578e9fa4512c25750e5bf50cab5ad715725057d487dd5595ace1d5bf259fe9fdc43e6fd04fb226ad058fe7d47a989b3320ea8e7ee1497148d73d4ab9bf03b8befb5b9b88fe8c0d87aef22d1925b5cbcd3b973a133b5948617b7020f4d9abfe581eedc6ea5c55f18175c1a3c695dfff8708499c9b78ded4b26a7ed9d173d7484b3c593ee29dc0f711d414abc8de2a8c4e3381177a01b9db984103362e87e1bc2610cf3641486d597f68dd2ded73071c32abc29750c6612997da137970ffd19cd196a5d700ba70b6fa72c195d25b43df33fb35666b61243a8bd93759fddff8341a32804c31205fe130a04d5f2e898a4e5681112d334f03b1693bc952877281ca3d7a348bd23f7dc91a388b80ec228d2dd93177186495e2e42a8018c7c08a77749a861cc402e65bd1f6fe3b942afde47858c892390a5ad898ba34265ff88eae6a9f374a46094c6083acf528d600af15172b52fa0b2e9d581e37ee8d46140e327dae9e0374ec8ce30706cc52da91f5a2d9e243f15b3ff1222dec9b06976c431e15adab72dcede4a18c501986dbacd9758d0d7f40278c5a676fd8313f3322f9eafa7e6fe5b00cae99ca32f345be02b350d872d8a608885527c30b676a123840d261d1613d62a7e6d255bb4bf9e067ed1a7cbd04ed020a3820f7173aca44d1a06948aed768bb2dbfb0430d2bd97ceb8e6e6f64c58792d6463de88e9a5bfda94a7dbba914d71dfe0e9b4318b204820ec5fc87e78e46df610d87848c44ee99843fac72bd9b76bc3071ff2433116a13435cee346a0996dba9f9002304304743eaff3644f6d95ba261ed62433a72786116ab0e89bd9e6091b2da9e793494053c374fefde7eb9f2ae6c4ac2dd1c93e389e17ee547fffef5e80cb9e278a3e892120031df90ae10a3d1aae227df336c72eb01f4de41469829e1ce2755fa638d54308aa0923488590ad9260857ef1eda6e4868e8b5a82605aa08fb55e70b45b3144a87aea1b8f7509f9064ee46a948cd1b30b80840697a1b0dc8db86cb94c03a25cb643f3555a90643cf9fdb2f42db2bd693230c2ca78c2ffee2bcd79b5884006207f4dd4a9470340bd8eb43afbd416bc83970b066b0677bbc37d45f38331d2c2b8571d052de1e9d654789d1c482075deab0e4d81ed07de2f1d22d64bc8afd6a6b57e33b80f876fa55d80c09ea40c3419f75cd753d9cd608069ee175aecb7ef3d4ffe3a8754c03e22a32d120a3b8a1c024f16ec46dc90ff5c257344f2efd6d356ba41468f37fde1cc2f8ce589bd976df8ccd1fe4aa38694059be2c737ad21359cc7b69a05f6d8880de233e2eaaf2ef9c5364efafc7bd87825429767e169fdd9c107256ab665446397a9695de5cfdc7988db6303a8893fce8bbdf91870c33445f547773c61dee04ecf7ebad7d131bae5705c2a4e9cc32d4f93dc019f74b07741a6ef98d0e06ab1771e00b9156a1ce4bc9ce64bb55a5bd7d163c842e0306ab14bb8df07a4312381194de642eb6b4f37f071c93628c5d0fe2fb9f6f8fbad8ebbcc1a2cc614e20bdb7d69e1f81dda7b9b6d6d746e651aaf5cdfe9d3c1e39e278db2f4f38c04b20d6b1ad15f4ad8cb8b78d7375e3b5e0206cca4ac18b4068b53ffd9059a9310b471b5476a202d93363520ec748aef0f2ad6d8974f87cf1ce7b9019be1367bc4639a111b4e2cbab8eb6b5548bbad326783a1d0be92290fdcc97ef96e4c89aa4df7e46677a20b074494b3323b12601f13bf366533c217740884700d659ba8de81fdb26b4a0ba56b1b9663fafc73a667c521754762edeb603036776a902979073371e448befd253c871e659d1e252d7e232b62ca0c18adb617851e781601456036d1e9d0e1cb6a16264bc5f783fec3608baac9c431f6db9eaea4b852da4d270c2a7e1f61626cb3f4abefda4179354d5c89df5acedb6c95af71d363bca18dedc1420e61b29c9c7787fcde733e49358bff926fb98526de4ea53d5bfd5d3b8f8e7b418be3efa3f924b6d14eacc8dd8514e714febb50e5648cf6785ce60cc7a1f3bea81fb1457ef4cf486dc0f4ee1a933e0ece9d30fa91843c4314a5a25a9398b9e7b9bb43e0f262bf3c1917549afbbd6276f12987e3c29d1650f9336b8688f654a6ae4bbd1732634efcfec61cdd06316ca72924834670e5ed6ca3c8b79896c329406dbbfafe554520ce4be0657030c6777303af495d6e01948c1ef01c3f5f264b9834896fc662b5820a9ce7629800f1644909bf10b75c9ec48386ea7f0aedcb7500c26a8a1793b0b1b36fe05e9dc2367776a9edab6ff43e6e53685b671be869ce1e3cf390d2ecdb25ab1a8eb7205988d9a21c9de6331665de58b86690bef6283d3031b5f1d2d30c2039118d93edcf04c6b741128a13a99af12063600a78e20a4b29ca1fd939bac75daad0f4f7547a3c1058d8577c902e51b6b3e6954ea7e20e1f43c0dc084bccf1cf150f9f1e7a92f1d418e9c088e88c0b17c5c86d172da09551722a63decf4de2caaa872f5457fa13e664d084235466b9326be4b8c7b8bf3dad310ac3369f949da0a6570e1eff5444f591c30e8cb8907e54fd98cad9d3bcba71c46be716c1ff7a08d821d1235852bf455f576aeea2887a298a8f0cf5c734a9d0e546bb2b5bc30109df19eae57b7d93323a2238b1ed047f10e1eae64aeec73c3dabe78d36696c197bf571cdf9854115e7f1499fbe9ceb99923c303906cd219fe90f74056ec7fe807c05a37e5d14bcba89c9dafa7a23c8afaacfdecae06d3bf611f0356073ec805c8e9d0f3ea183ae3066d40924edb4a54f77ce7d34b099e267fe52673a09192da6d9b3925ad397dc6e0db1b379612e291b960d700dfc590a206d16a3cdaf2be1b1c2e9137435f5b2b57d6571e6b3c433dad942066d3c1cf9edd28e8482caa1493602a02cd9a6e14bfe4b7bce3bbec724d1e1b44cfa69b1980e2baf4c07ee7f1b4fba6e15ec65d4911f3062eef3cbd95e16cb020c8c57ac4ea666f4aa15822105d7772850abeafbf9a051f90aca029c41b16eada8d0827b3ea7d39ff61c360732244d5cc24f577bb53eaf415a31eba56a00a699e68e0c58ac8cae1b7bb96520516da32e2492d207bf85e8f2cf84bdca65c20303ef22884adf32bb4b3365120ed37a6219af3c68a3a4b26cbbdee0d0682beeaff6f8775989ec7c4ea3c799f7da90cafa915d34540a21bb0a1af04d6d1f7e0bfe91192318cabf1a9e3f67a44c353a4955a89a04fbcc5ed1d8ae282ee158c5d3d125491ded18fffddf47854a1f6d8b9084a936fdc2b6580946abe60012f8f300e9e9357a8089ef6a410c57d7868bb8f3e6f1536a75fba36c26156fd5ef7b8b321583db2c19066ae2925bc5ccc218bc28c0523160e452bf350a3779ce69e9db38425ce01763aa39a6d15cbd40699739e157c6bcc6cfd6c0343897ae83d4c7858721e5269c23143526031b2871f2ea2072d9c86a09e65e18f2ec05866a5ced9a7bf7333b195a06b18f6b2faefae081cc6fa11cedd49d06de126ddd83e553168de45c4c00fa2b2fdfe15d544815493d82a6e420c4f2fd9b9fd36e97428636e27323072bcb630275a90aca7e205f146ca0fb10a2107737d58548e3793ae1c815e4e51833727a7236c270c20d0f9c1b61b55470e063eaa19b4866d2e86c73ffc4bd025f01dde796a41e565cade5f01a409fccb37b4308115df8fd1bf486b906afa64f0057fe50c4801c1082cae31f01d02c4d1c28f71122ccbbe84803417991f6f3956bc6c06e7cdd3f92c48fb94370b21fddd96f3586f9afa88422a0977c078e681a95a4c0", 0x1000, 0x8000000000000000}, {&(0x7f0000001400)="02f01740f636d18b71b4336688f10ef44a5001ec74e555c1b535057ee6961b088b62c411a348df261454a7028975f9b09721323a1c49ec6f50dcadb2b164f9baec853bda411e9b5775e16d8f23b88534bbb43e2840caafd14aa9274defe951a8a6885016522bbe9d6bc1fb92fd9903de29792ea3fe00c498c21707409416df4cf09b8f46ffc870da1d16e82f2ba1ede0044650644a6957bd748d1896", 0x9c, 0x8}], 0x200080, &(0x7f0000001580)={[{@discard}, {@quota}, {@barrier}, {@dax}, {@delalloc}, {@noinit_itable}], [{@uid_lt}]}) socket$inet6(0xa, 0x3, 0x6) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001600)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x10000, @remote, 0x81}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x10380080, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3ff}, 0x1c) (async) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x6, &(0x7f00000014c0)=[{&(0x7f0000000140)="0b23984cc27eff98252e40d3f619721050fece0ae2c7b0bcb10e5315d522d033b90cfb4c96e75cc3159e88632aaf410d79ae33671e9822fb5de6a624f33fc263b29687fee8a728d656eb9d58d5a3cce89800d5425b7ac8d1d6922c79", 0x5c}, {&(0x7f0000000200)="1f064adda44ed52b2d01ccaac57669bb1dbb7fb274c2a63b3857b59ae310b402e1fdfb33733c71e85da6e3326d0845b620cf763bbb880a8065d3da2a956279d2b7cb027823e51e280ac4c85e523b1727230e15ae48abad8748e9a1dd8565eca84fc609d1504a268c37", 0x69, 0x4}, {&(0x7f0000000280)="8002b0c24b79a934bd9ef9f8c10820b96523cf3309db72c7dbb8cea952bce9a5a0612c4e14297397514befc98cd1e91f80a65eb82877c9fbd2cd2fc0afd51f47534e40a782bfac44987ef37ed3109b992ddb85714dfd94879761d46ff33cb2481d0b415d098dd4df088f07674490a9a965649c4970b219391b1e59b2b86daab6d028592a8306d81bd2ed1f2f03d6e3fa79841872dd11ef347bffd6c2a8c005889a60a7be591a598cdd0ec1d55bf39499385a3c7a399f889575828bbb8dbbcb95bbefdc976b1d0f01ef6223e6364c41ed4a8b73926889ec14bc7a9cd9b384e0f1670f3418e69d56a13b46f67d1621d75ed683f400b5674bee0bd74b848c23", 0xfe, 0x5}, {&(0x7f0000000380)="d6c0fffff094ab9459b49b3fba3801e8dc5b2d48341f22d2acc0d41af61111f6784404bd79cbe66fa62ff434fa668764cf201c7730afc56ae844f18e6e345955763e8ca6b585a97077ec2d3d722dbd0a7419d5f754cbf9", 0x57, 0x46ae}, {&(0x7f0000000400)="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", 0x1000, 0x8000000000000000}, {&(0x7f0000001400)="02f01740f636d18b71b4336688f10ef44a5001ec74e555c1b535057ee6961b088b62c411a348df261454a7028975f9b09721323a1c49ec6f50dcadb2b164f9baec853bda411e9b5775e16d8f23b88534bbb43e2840caafd14aa9274defe951a8a6885016522bbe9d6bc1fb92fd9903de29792ea3fe00c498c21707409416df4cf09b8f46ffc870da1d16e82f2ba1ede0044650644a6957bd748d1896", 0x9c, 0x8}], 0x200080, &(0x7f0000001580)={[{@discard}, {@quota}, {@barrier}, {@dax}, {@delalloc}, {@noinit_itable}], [{@uid_lt}]}) (async) 12:56:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x700000000000000) 12:56:04 executing program 3: socketpair(0xb, 0x0, 0x0, &(0x7f00000000c0)) [ 1114.896808][T18836] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1114.904808][T18836] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1114.912773][T18836] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1114.920802][T18836] 12:56:04 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xffffffffffffff7f) 12:56:04 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, 0x0, 0x40) [ 1114.945315][T18844] loop5: detected capacity change from 0 to 545 [ 1114.967246][T18844] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 90) 12:56:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xc3b}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f0000002240)={&(0x7f0000000080)={0xa, 0x4e23, 0x8000000, @empty, 0x7f}, 0x1c, &(0x7f0000002200)=[{&(0x7f00000000c0)="223f263af8d9ef9ac75d25608017911efdcc1f0f20f5f7720c282f9a9edce39922e194538beb219344e050a130fcc6001b9d86f60a95", 0x36}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000000100)="1a159cc6097286aeac21b71badc892e40d02a550dc56c037a14f8b6e12e8914a7a315a78d6c688c69e524c2218372f9a3096b54cb8bbcbaae13baab4516f6c97fdfc7f42a695bc8c4b11115cfd1be4407af3e5b652fe285bdfab7f96d59dd4c412826b533332436705f2b8151badba4081c04d7b9ca0855d4c56079d98ad44f8350290f8c3fc96d0553108e38a9f8faca7a03f39d6329f5175f705e4fe5d979e7b068ba089d7", 0xa6}], 0x4}, 0x24000080) 12:56:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1114.995121][T18848] loop2: detected capacity change from 0 to 545 [ 1115.021557][T18860] loop4: detected capacity change from 0 to 545 [ 1115.049807][T18860] FAULT_INJECTION: forcing a failure. [ 1115.049807][T18860] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.062510][T18860] CPU: 1 PID: 18860 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1115.073673][T18860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.083734][T18860] Call Trace: [ 1115.087017][T18860] [ 1115.089938][T18860] dump_stack_lvl+0xd6/0x122 [ 1115.094538][T18860] dump_stack+0x11/0x1b [ 1115.098701][T18860] should_fail+0x23c/0x250 [ 1115.103163][T18860] ? __list_lru_init+0x352/0x6d0 [ 1115.108100][T18860] __should_failslab+0x81/0x90 [ 1115.112860][T18860] should_failslab+0x5/0x20 [ 1115.117387][T18860] kmem_cache_alloc_trace+0x52/0x350 [ 1115.122740][T18860] ? __list_lru_init+0x352/0x6d0 [ 1115.127683][T18860] __list_lru_init+0x352/0x6d0 [ 1115.132545][T18860] alloc_super+0x4a8/0x510 [ 1115.137198][T18860] ? get_tree_bdev+0x3d0/0x3d0 [ 1115.141970][T18860] sget_fc+0x1b3/0x450 [ 1115.146231][T18860] ? test_bdev_super_fc+0x40/0x40 [ 1115.151260][T18860] get_tree_bdev+0x1c2/0x3d0 [ 1115.155897][T18860] ? note_qf_name+0x140/0x140 [ 1115.160590][T18860] vfs_get_tree+0x4a/0x1a0 [ 1115.165087][T18860] path_mount+0x11cf/0x1c40 [ 1115.169592][T18860] ? kmem_cache_free+0x65/0x110 [ 1115.174464][T18860] __se_sys_mount+0x24b/0x2f0 [ 1115.179200][T18860] __x64_sys_mount+0x63/0x70 [ 1115.183808][T18860] do_syscall_64+0x44/0xd0 [ 1115.188251][T18860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1115.194222][T18860] RIP: 0033:0x7f533ffa557a [ 1115.198626][T18860] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1115.218236][T18860] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1115.226705][T18860] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1115.234690][T18860] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1115.242662][T18860] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1115.250630][T18860] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1115.257223][T18848] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1115.258635][T18860] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1115.258655][T18860] 12:56:05 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfe80ffff}, 0x1c) 12:56:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x800000000000000) 12:56:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xc3b}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (rerun: 32) sendmsg$inet6(r0, &(0x7f0000002240)={&(0x7f0000000080)={0xa, 0x4e23, 0x8000000, @empty, 0x7f}, 0x1c, &(0x7f0000002200)=[{&(0x7f00000000c0)="223f263af8d9ef9ac75d25608017911efdcc1f0f20f5f7720c282f9a9edce39922e194538beb219344e050a130fcc6001b9d86f60a95", 0x36}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000000100)="1a159cc6097286aeac21b71badc892e40d02a550dc56c037a14f8b6e12e8914a7a315a78d6c688c69e524c2218372f9a3096b54cb8bbcbaae13baab4516f6c97fdfc7f42a695bc8c4b11115cfd1be4407af3e5b652fe285bdfab7f96d59dd4c412826b533332436705f2b8151badba4081c04d7b9ca0855d4c56079d98ad44f8350290f8c3fc96d0553108e38a9f8faca7a03f39d6329f5175f705e4fe5d979e7b068ba089d7", 0xa6}], 0x4}, 0x24000080) 12:56:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0xa0101, 0x0) 12:56:05 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffe) 12:56:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 91) [ 1115.528098][T18876] loop4: detected capacity change from 0 to 545 [ 1115.533494][T18877] loop5: detected capacity change from 0 to 545 [ 1115.541819][T18878] loop2: detected capacity change from 0 to 545 [ 1115.549598][T18876] FAULT_INJECTION: forcing a failure. [ 1115.549598][T18876] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.562377][T18876] CPU: 0 PID: 18876 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1115.573438][T18876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.583488][T18876] Call Trace: [ 1115.586759][T18876] [ 1115.589682][T18876] dump_stack_lvl+0xd6/0x122 [ 1115.594300][T18876] dump_stack+0x11/0x1b [ 1115.598488][T18876] should_fail+0x23c/0x250 [ 1115.602945][T18876] ? __list_lru_init+0x352/0x6d0 [ 1115.607941][T18876] __should_failslab+0x81/0x90 [ 1115.612712][T18876] should_failslab+0x5/0x20 [ 1115.617278][T18876] kmem_cache_alloc_trace+0x52/0x350 [ 1115.622585][T18876] ? __list_lru_init+0x352/0x6d0 [ 1115.627516][T18876] __list_lru_init+0x352/0x6d0 [ 1115.632364][T18876] alloc_super+0x4a8/0x510 [ 1115.636882][T18876] ? get_tree_bdev+0x3d0/0x3d0 [ 1115.641648][T18876] sget_fc+0x1b3/0x450 [ 1115.645732][T18876] ? test_bdev_super_fc+0x40/0x40 [ 1115.650842][T18876] get_tree_bdev+0x1c2/0x3d0 [ 1115.655432][T18876] ? note_qf_name+0x140/0x140 [ 1115.660193][T18876] vfs_get_tree+0x4a/0x1a0 [ 1115.664618][T18876] path_mount+0x11cf/0x1c40 [ 1115.669216][T18876] ? kmem_cache_free+0x65/0x110 [ 1115.674118][T18876] __se_sys_mount+0x24b/0x2f0 [ 1115.678843][T18876] __x64_sys_mount+0x63/0x70 [ 1115.683440][T18876] do_syscall_64+0x44/0xd0 [ 1115.687925][T18876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1115.693853][T18876] RIP: 0033:0x7f533ffa557a [ 1115.698265][T18876] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1115.717867][T18876] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x9c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff51bc}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xb4f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4f77}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xaef}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000040}, 0x2004c044) 12:56:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xc3b}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) sendmsg$inet6(r0, &(0x7f0000002240)={&(0x7f0000000080)={0xa, 0x4e23, 0x8000000, @empty, 0x7f}, 0x1c, &(0x7f0000002200)=[{&(0x7f00000000c0)="223f263af8d9ef9ac75d25608017911efdcc1f0f20f5f7720c282f9a9edce39922e194538beb219344e050a130fcc6001b9d86f60a95", 0x36}, {&(0x7f0000000200)="c3c8559c40ea90f62e157a3d68492e6e2bb88874bc69713c7a60f5b06720a24ce236a5ec26c1fbc1109c0723301d6b065374a265e0028ea2741f65836ebadac83266a35458661a52071b2aace7e0f773160986519de0414ad64d35f495617a99208e1e13c5b91c6884c60145299df1047aacf686dad63057b45783dff39b3b007fe5677fdf4eff0584708141b6ca8a5ccdfe60f829d45176eaf57bb9fbce8878bb5571bd6003de2bdcf5a1bf028c26fd375b119b1771757156eada99a0b6344a0367ad67047bf3f713b4d7a7c2113f73040c8d2489a00e5c989f9ecbe1fc0968cd47eb8d667c467790c954bcfc9ea088614712862d8650e5b4d2e66d08ecafc2835fa28a21ce7ce3101cdf1bd83e3c4800fe12fbb061d1381e97956050196a0e4bc07cb2d27fc6cba9e16ef472cc5a5c3f534414de99baddb4d71b447519614a058561720a02c54535ea3d5b793c5e68d596f68af4ab11b8cfd2b0f468501b1711f1fe2ccb4261aec519bd8ca9d411cf10479064f20db90e753878380b6ff66c9a6ab78bea2bbf951e78ecfdd4126d8d64cb5cdde18379add720f18b0f58d90d61e71f20adce3d181dc51743bfae8f758d9a40556911dcdf751a339642a644e81a9d0f9e18533c0b0c9a91fccf5488c053ffce51c057a04d4f1c5b2afe455e4b373590aa6512c3893032b87d7ad844a041e9e81e7a7361a8508b6d1813b1c1375340b9ae6f522cc41e8694746b275a90d966fcb318197e62d60c368ca3fdee4d165ae543ace684115f598f6f50eae0c833ab419443f07d93ebb80163ebe5d9828bd9f221f878bb9c7107630665085e429aa7b65e390a1e62cc2cf5d3a1662521312a32367585a13fce4a10183e96be46d09965ba953c7fdb0fbbc925ac4c20f306b534b725edcecaab7c5ca955777649e03ccf978d78cd33b584fb5ab8aedaa0f30720b444fbd680c801ccd96b06cbf016e839bd01ee19146652b9aca53a48af03abad050f857a60a677605d3333abbf951023e97449aaf162907a84970b5507a5ba7ead9fc05d24bed15d12f589a22b49972db97fb688ae7fabecb34b035100f5b2a64822599f3d9df24b70a43aaff89264dbd120e4c482aef920352a9f725df887ce002f0b119216adb4f89ee270f359a47f6fe3ba431cb0fd25716b5953ae0f1f38a81189680d5d3f74fe028c6e3aca9e5f1fa7485d706f57756bf315cae1a23d31d82db5ed2f7fac48cd11deaf26204425e29847bdc0d664aa6031a8a50a064c4b373a5c0828bd7eaf3cf207a85f464bca1350e0ca82a2c6c0d2c2b7c27ccf42afd99a52be031ef3df75971717af36ea92146055b4a65378f6342a871edce1151404ff629dde2e24de6280b60958f7940f9f12c894ef991faf6bcd2aa045294c9c0d1533dfc96a4e8e4e970598b9d302985f31186d3544b05c6c6ace96031369b8db88bdcfa57397efac62da78de9a35080f5afe391558d1898d16e922c996a203f4245cefd11d3ff6f089b35fc55cc6d88e58cf5960af72d8b23dfc2ea728ea4fe481a744744e697aa049b0f99498f83eb31c7331b999ca5888afc4c4c17b844cce72d30c7cf703cce0934da5a4489ef149f1ab18c43bb538ebcb002bc6800687d2c91c581c1966d4fa4b1271d9b548e18e28b7eff3e0bfe29b22cb8a3339396cc38c0c7d3c8a05cd26da20f95d2385a0e8e4b8b58a3013c681dbbc3949da69210799019483f0639134cbe9cdee7646cfaa417f3eac9af8498bafa1aa0f0e2c4b358de1933f6bf6c805e343738082f8e32a86e267944e65a947fd71a68cc1f3b7dc5b089936371189c87335beadeb4c26b9c9a1d135f82c4394e6ab8a7c8a473b1795d45edf8cb82ebcc1c1a8b7dab98b783ecf4d526197c48dfbdfbb0580db74774fb6f317310c84cd3cdf28783f56a3cf9b0a55c41f3b1dc6a39ab0ef473e40600cbbb0ceace53afdc25ebd572656556cb33656bb751838f68005ab9e2b169f2055023e2e71efaed6ce3bf3856aff756a8d0d38091a3ed740549ec181f8eef0f21891c54c3355bde428900654d19858130be97dec93ff71c03ca5029b9a545dcd9ed1e7353778e1d8608be2598d004cb94e57c26be89ac3c3dd71f3d43bc27e0a0649a7fc2a4a343c925701f05ad9409c16586435062cc88abca5bf42c231d27d7d45e586872edb405e1521dd765308173210aeedaf2d46b34f91129fc20051261c6680ff59d78fc44bf003811199e74ee029c3f8fe3b24fce66107d10376c7a0ac1d99b7a1efe55b9394998e07193ba590bceb38c88e79ee9bd2e33be1f7312c8c6bb0c95b0fe780a01c784a254f4e9a5e46d009a0357250e6e52853f92a4b7ac9a30773fb6b08c2aae0cb086404a5f8efaf63eda04aa2ebd3fde31c6fbae4f712d181877295de20f04e32597936a20c65494b5e168bde6da9ec5281d91e67cae7186674f05fe0050ee24a4a3a8b9e4f79b69523eb6f64acd88b51625f14d215d6a773dcd2bc950ed64e4aa81c1c51a7c1f53c88bb0ce557071c8b3a29c79ccca89394ee3bd453a3aab602e3c8631ab63633d0169a4dafb6fd975efb46985ba219c7939e504062129c1d7f89e692aa92a55a131af8a3623e65f5ff12ae5ccf752f73692feec640083f5ae18acae6a14e8314b1e71d4a36e3cd39205a82bff697ae2af2234a5157ec245a80cf8808b1fbcd5ea0a9f59fa3cd2b2a9903916066e36fbc255cc2cff233128e9c020c85a2894917f5680abff903a165e54be3d87cf4aee3c795fa2517dfcbfb752272138980026796a1c2905b82bba03d7998b996aec71618f7435188a0cb664378d82e8b1a013dd4db8c2956600bb9807661d9acf451b7e50713994632e8cb11bc62d57f5f230fb08e1aa9fceaad97d043970c0f6938864270de78f10ee80e715dd382daa8b6258028eeac948f48ac519d372530b8881e68078e7b260f42dff1ebfb9252aaf9db327b39140340848ff1ba4b649cb0db4d573d642cdff59666e65aebeef8e6ce93a86f5cb651fdadff9da4bc9d641f93699a3815f88b95f8ee1797ae8ad628a75c17a1519005a77e36f942cfd92fcd624e5efa808563eebd2facaa9d79ae470c32b42497e6cbd8941a5fa079d4264fa6e2ce9758f01b8d983bf3ed651f7e0cb19a1b8f247314b3b1ae37571aa43f16ebb330f2b0aa10fc9f34ea63c9e654f5f59720b82cb6a16e86f4ba3da323a954be08b1cf4795eb0140d6c1e47a07d19ba3b5a58651b684192fcce8817746cc9131a5972323f9caec38dff1497a391875b383e558fbbce59afb3a904a7b3a4dc2c01c9a7088ceb2a37192f78b29d674aa6f1e415377f228fe9b93425000cea828516db70538cf23d98fcf380ed79c0b5da618d6124a4a84e71221a10f2188bba07a6382e343af59fbb3b0e26507d6539a52637f3586c5af882c56ea5d2f092cefef3afb68e2b3a3a1c4febfe0d5796bd5287569569ee2c4c9e3bd415a076cefdeba7562a3ebd8ee0b3376a529871b22a96457caece18ed3e9c7b89575ac5bb62c37a4bd66e07c60380e317dc05fcc9f0d758b5c269154783b2739377cc330c9c3b21bf3e2871eeab4fd22f7c7c246adf26bb470bc8f41988d662622a5bdf6fc807f6a4b9fab69954f15a5ef5b9401c6cef9c7465ab37f7c868d7659890211e8e08bcb7a28a9845db1013fb3697907554e0095f82699df2fbd5df2095965d5cac662542655edbd2511caad50a426802ecc3701fbd2ae34b9d1715f12d01ae60644e4e888b48b3b596cf6837f7492fc3071c6fa8b7090d83fa2a8054e1a8b388fdcb8bb6b0eb0acd5f2671d42e6f082b326ca22b6347de5f42731b6b80b45712a472280b2cd837ed85a30ca182d49ff53bd7163e5be593cd69c0ad01b61c6eb3ab613ff90dfe56d23ccd8de50440082835d894e460ff7e623df6f07744d998e9a015bd386dcacf543366ad3e3d4f57277d5f6673f8bc953f77fcf5cc2719be89553d53a4bc9acaacf30c8591387c43b03ae1a9bfa6f13bf1d47fe4dfc0affd317b1812abaf704c37b1cba77d9226f5706de77ac84a7df4bf3e3a5bb7c578c225c1356b16440bb85e070931fd6836136716e7c07da780b71d755ddb22ec7ebf2125f71ce251fcb7921f2b062a88d0a335bbac7c941847070d654a786cefbafe0bef18d606a143f427cb135a09177f1ffe2fefafa0ee201d9aa7085aa6e43b498aa05938227ee03a0bf83f66ac48fa851cfd15ff992fd180765ea7cd2da3ab504a0cd20f346296eb337894ded3623381a868c1a933416a595f55022c23c804d2d72739884b628c29a88e8dd2fe849c60564c377c42a25bf70bf26f3ac2eeb41e450314b580a2a64b85e2bf57486498cbe92faaaa0272d57809497e95ecfc0e27b683a52d801daec74f82b797c0d5cd69fe08d3dde514b4b7cffa255f1f39d52391ab8f96b8e0cc6c900f0059d823e9d3915c8c7c76df38254134696b6c4937a5db6f0d9c7a785e1a1c1edfacd0dc2c8b2c10c27b829d89e48ffae680aecab9ef313e78642f2eb08cd22d8935bef4702042ebf86858604f36e00d9a33ef9f64dbbc64453204ffca026eb751ed64e94c3e364e2078e54d623bd7130e2093bdf75af95b3bae8ad1d3871745c6efb466c37e67666c7ab64d702ae56e08f9b08c15bc8f73f4785a1e4c27a875d6d65a82c0201533d964fb9330eb6c2b99f953a2dbbf14c86432a92aea397cbf0f10cda78eb94a1c294311764673a5569fc11d64d35c774a5f93b7f0c9a7b4c6c753aa2d04366d8f18898e7f8c00f536733edc9a6ea70a13c61c4bafd418eb2697639c6e910c90f111f38f7575fbe48cf4dc80e1e27338deb031390199e5185dca0aa3d89cf7d0bd18bd337ba45ffe8c03af6d70d96e0634336e2af2d9c1a64ba26422c5b02a5d18b930aead237fcb1c89410b27c6a5e188570eac6428ad3de93f87ac25a2dbe2a424c2d985b6d777cc9284c9d3987d643d6b12cae205045af22938b964613d1695d7dfb6c1e8e0fc61ce23cf6f54cf6d703c732bfa31a7e608b802012f9c13ec7f23a5667a2be6deb0c07dca95dc4ad07e6bfbe3dbdd4cd3ab9246425e37e8bc3ac7fd527aab6098248c2cb47907c8b61c1b5db5a86179ec4a25732340f67bb548e382d5125a190cb6f2eb1baf0fdb5da71763fc1aa9348f830971b3790ac4f3418008bea7a6e00b5a616a42407cd60fb5a6a2a635b10beea3e44d3129bdcb92d388b2a40e89a32e86f3b706a200437b85ea98dad232f3d2a613c4852adac766da121872dfba99bbdb9ab1ae07f941d5ecaf72117b19b37ecb765164e4fb67f27e04dddde48979e1a744abd0e3cb8e3af030af3b37afc2f657696350e66ec48e26b8eda044c6850f4182c7f36353926b8efa070e775ebb0e85977d283f9fa7bb55e894e37b3111a5704ca791660b587821a13895207c9a9e309e356706d41298f0e751394617a46fe1cc260439b92143f7d942df3601c2a65f04408377e76f3f2296d19b25c356e7f533d5ff48fd75ffb9c13da12149f29ed39d5d7ddbdf250f270c02f73cf61550297c6d249f381f8d5774293398d1239f0a6b2f01c0f9c6f238f8b828eca966528e6501a204762505f26730b37da64e69e5ea9de40ae87dd2941f691856e3382a55e4f05ee3d1e4db3cf66dc846f895c0533f37103f048a42e7e03ee79776fe407397f74347682436b2af3def77c991c7bba1f8846ddbac4b53bd642aef879e5f0a06d6d42a446508c184d3e07a067cd0a1a5b59db39da0ab24bfa8b421e719d787c6a2a4eee", 0x1000}, {&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000000100)="1a159cc6097286aeac21b71badc892e40d02a550dc56c037a14f8b6e12e8914a7a315a78d6c688c69e524c2218372f9a3096b54cb8bbcbaae13baab4516f6c97fdfc7f42a695bc8c4b11115cfd1be4407af3e5b652fe285bdfab7f96d59dd4c412826b533332436705f2b8151badba4081c04d7b9ca0855d4c56079d98ad44f8350290f8c3fc96d0553108e38a9f8faca7a03f39d6329f5175f705e4fe5d979e7b068ba089d7", 0xa6}], 0x4}, 0x24000080) 12:56:05 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) [ 1115.726281][T18876] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1115.734455][T18876] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1115.742440][T18876] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1115.750408][T18876] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1115.758378][T18876] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1115.766400][T18876] 12:56:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) signalfd(r0, &(0x7f00000000c0)={[0x7ff]}, 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x780080, @loopback, 0xfffffffe}, 0x1c) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c77786403003d", @ANYRESHEX=r4, @ANYBLOB=',\x00']) getsockopt$inet6_int(r3, 0x29, 0xd8, &(0x7f0000000040), &(0x7f0000000080)=0x4) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74726104358a61c08ccc62646e8646", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x6, 0x3) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) r6 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}}) shutdown(r6, 0x0) 12:56:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 92) 12:56:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x900000000000000) [ 1115.799703][T18877] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1115.803431][T18878] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1115.861579][T18901] loop4: detected capacity change from 0 to 545 [ 1115.870796][T18901] FAULT_INJECTION: forcing a failure. [ 1115.870796][T18901] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.883450][T18901] CPU: 1 PID: 18901 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1115.894473][T18901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.904593][T18901] Call Trace: [ 1115.907867][T18901] [ 1115.910808][T18901] dump_stack_lvl+0xd6/0x122 [ 1115.915405][T18901] dump_stack+0x11/0x1b [ 1115.919649][T18901] should_fail+0x23c/0x250 [ 1115.924067][T18901] ? __list_lru_init+0x352/0x6d0 [ 1115.929024][T18901] __should_failslab+0x81/0x90 [ 1115.933800][T18901] should_failslab+0x5/0x20 [ 1115.938413][T18901] kmem_cache_alloc_trace+0x52/0x350 [ 1115.943695][T18901] ? __list_lru_init+0x352/0x6d0 [ 1115.948671][T18901] __list_lru_init+0x352/0x6d0 [ 1115.953436][T18901] alloc_super+0x4a8/0x510 [ 1115.957932][T18901] ? get_tree_bdev+0x3d0/0x3d0 [ 1115.962764][T18901] sget_fc+0x1b3/0x450 [ 1115.966868][T18901] ? test_bdev_super_fc+0x40/0x40 [ 1115.971968][T18901] get_tree_bdev+0x1c2/0x3d0 [ 1115.976572][T18901] ? note_qf_name+0x140/0x140 [ 1115.981295][T18901] vfs_get_tree+0x4a/0x1a0 [ 1115.985719][T18901] path_mount+0x11cf/0x1c40 [ 1115.990225][T18901] ? kmem_cache_free+0x65/0x110 [ 1115.995084][T18901] __se_sys_mount+0x24b/0x2f0 [ 1115.999777][T18901] __x64_sys_mount+0x63/0x70 [ 1116.004422][T18901] do_syscall_64+0x44/0xd0 [ 1116.008932][T18901] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1116.014888][T18901] RIP: 0033:0x7f533ffa557a [ 1116.019297][T18901] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1116.038991][T18901] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1116.047434][T18901] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1116.055475][T18901] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1116.063443][T18901] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1116.071411][T18901] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1116.079394][T18901] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1116.087384][T18901] [ 1116.092008][T18902] 9pnet_fd: Insufficient options for proto=fd [ 1116.106116][T18902] 9pnet_fd: Insufficient options for proto=fd [ 1116.107647][T18904] loop5: detected capacity change from 0 to 545 [ 1116.123882][ T24] audit: type=1400 audit(1646830565.619:520): avc: denied { shutdown } for pid=18897 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1116.144897][T18904] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:05 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfec0ffff}, 0x1c) 12:56:05 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000000300)=""/221, 0xdd}, {&(0x7f0000000400)=""/143, 0x8f}, {&(0x7f00000004c0)=""/117, 0x75}, {&(0x7f00000000c0)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/192, 0xc0}, {&(0x7f0000001600)=""/78, 0x4e}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/98, 0x62}], 0x9, &(0x7f00000027c0)=""/99, 0x63}, 0x8}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000002840)=""/5, 0x5}, {&(0x7f0000002880)=""/12, 0xc}, {&(0x7f00000028c0)=""/248, 0xf8}, {&(0x7f00000029c0)=""/124, 0x7c}, {&(0x7f0000002a40)=""/191, 0xbf}], 0x6, &(0x7f0000002b80)=""/206, 0xce}, 0xffff}, {{&(0x7f0000002c80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002d00)=""/10, 0xa}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000002dc0)=""/97, 0x61}, {&(0x7f0000002e40)=""/154, 0x9a}], 0x4, &(0x7f0000002f40)=""/83, 0x53}, 0x3}, {{0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/124, 0x7c}, {&(0x7f00000030c0)=""/28, 0x1c}, {&(0x7f0000003100)=""/55, 0x37}, {&(0x7f0000003140)=""/38, 0x26}], 0x5}, 0x1}, {{&(0x7f0000003200)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004600)=[{&(0x7f0000003280)=""/91, 0x5b}, {&(0x7f0000003300)=""/167, 0xa7}, {&(0x7f00000033c0)=""/201, 0xc9}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/131, 0x83}, {&(0x7f0000004580)}, {&(0x7f00000045c0)=""/35, 0x23}], 0x7, &(0x7f0000004680)=""/1, 0x1}, 0x4}, {{0x0, 0x0, &(0x7f0000004740)=[{&(0x7f00000046c0)=""/114, 0x72}], 0x1, &(0x7f0000004780)=""/94, 0x5e}, 0x9c3}, {{&(0x7f0000004800)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000004880)=""/7, 0x7}], 0x1}, 0x7}], 0x7, 0x40002020, &(0x7f0000004ac0)={0x77359400}) fchownat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xee00, 0x800) open(&(0x7f0000000080)='./file0\x00', 0x402000, 0x109) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:05 executing program 3: socket(0x0, 0x500, 0x0) 12:56:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 93) 12:56:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xa00000000000000) [ 1116.397981][T18911] loop5: detected capacity change from 0 to 545 [ 1116.398711][T18913] loop4: detected capacity change from 0 to 545 [ 1116.404773][T18912] loop2: detected capacity change from 0 to 545 [ 1116.418345][T18913] FAULT_INJECTION: forcing a failure. [ 1116.418345][T18913] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.431090][T18913] CPU: 0 PID: 18913 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1116.442106][T18913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.452189][T18913] Call Trace: [ 1116.455471][T18913] [ 1116.458393][T18913] dump_stack_lvl+0xd6/0x122 [ 1116.463005][T18913] dump_stack+0x11/0x1b [ 1116.467242][T18913] should_fail+0x23c/0x250 [ 1116.471667][T18913] ? __list_lru_init+0x352/0x6d0 [ 1116.476609][T18913] __should_failslab+0x81/0x90 [ 1116.481384][T18913] should_failslab+0x5/0x20 [ 1116.485891][T18913] kmem_cache_alloc_trace+0x52/0x350 [ 1116.491191][T18913] ? __list_lru_init+0x352/0x6d0 [ 1116.496213][T18913] __list_lru_init+0x352/0x6d0 [ 1116.501018][T18913] alloc_super+0x4a8/0x510 [ 1116.505434][T18913] ? get_tree_bdev+0x3d0/0x3d0 [ 1116.510371][T18913] sget_fc+0x1b3/0x450 [ 1116.514492][T18913] ? test_bdev_super_fc+0x40/0x40 [ 1116.519522][T18913] get_tree_bdev+0x1c2/0x3d0 [ 1116.524238][T18913] ? note_qf_name+0x140/0x140 [ 1116.528920][T18913] vfs_get_tree+0x4a/0x1a0 [ 1116.533388][T18913] path_mount+0x11cf/0x1c40 [ 1116.537893][T18913] ? kmem_cache_free+0x65/0x110 [ 1116.542770][T18913] __se_sys_mount+0x24b/0x2f0 [ 1116.547508][T18913] __x64_sys_mount+0x63/0x70 [ 1116.552102][T18913] do_syscall_64+0x44/0xd0 [ 1116.556519][T18913] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1116.562443][T18913] RIP: 0033:0x7f533ffa557a [ 1116.566853][T18913] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1116.586517][T18913] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:06 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x450500, 0x0) [ 1116.594925][T18913] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1116.602896][T18913] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1116.610894][T18913] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1116.618927][T18913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1116.626895][T18913] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1116.634893][T18913] 12:56:06 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x1140a, 0x4) 12:56:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) signalfd(r0, &(0x7f00000000c0)={[0x7ff]}, 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x780080, @loopback, 0xfffffffe}, 0x1c) (async) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) (async) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c77786403003d", @ANYRESHEX=r4, @ANYBLOB=',\x00']) (async, rerun: 32) getsockopt$inet6_int(r3, 0x29, 0xd8, &(0x7f0000000040), &(0x7f0000000080)=0x4) (rerun: 32) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74726104358a61c08ccc62646e8646", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x6, 0x3) (async) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) (async) r6 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}}) (async) shutdown(r6, 0x0) 12:56:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 94) 12:56:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xb00000000000000) [ 1116.650447][T18911] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1116.659996][T18912] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:06 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000000300)=""/221, 0xdd}, {&(0x7f0000000400)=""/143, 0x8f}, {&(0x7f00000004c0)=""/117, 0x75}, {&(0x7f00000000c0)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/192, 0xc0}, {&(0x7f0000001600)=""/78, 0x4e}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/98, 0x62}], 0x9, &(0x7f00000027c0)=""/99, 0x63}, 0x8}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000002840)=""/5, 0x5}, {&(0x7f0000002880)=""/12, 0xc}, {&(0x7f00000028c0)=""/248, 0xf8}, {&(0x7f00000029c0)=""/124, 0x7c}, {&(0x7f0000002a40)=""/191, 0xbf}], 0x6, &(0x7f0000002b80)=""/206, 0xce}, 0xffff}, {{&(0x7f0000002c80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002d00)=""/10, 0xa}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000002dc0)=""/97, 0x61}, {&(0x7f0000002e40)=""/154, 0x9a}], 0x4, &(0x7f0000002f40)=""/83, 0x53}, 0x3}, {{0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/124, 0x7c}, {&(0x7f00000030c0)=""/28, 0x1c}, {&(0x7f0000003100)=""/55, 0x37}, {&(0x7f0000003140)=""/38, 0x26}], 0x5}, 0x1}, {{&(0x7f0000003200)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004600)=[{&(0x7f0000003280)=""/91, 0x5b}, {&(0x7f0000003300)=""/167, 0xa7}, {&(0x7f00000033c0)=""/201, 0xc9}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/131, 0x83}, {&(0x7f0000004580)}, {&(0x7f00000045c0)=""/35, 0x23}], 0x7, &(0x7f0000004680)=""/1, 0x1}, 0x4}, {{0x0, 0x0, &(0x7f0000004740)=[{&(0x7f00000046c0)=""/114, 0x72}], 0x1, &(0x7f0000004780)=""/94, 0x5e}, 0x9c3}, {{&(0x7f0000004800)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000004880)=""/7, 0x7}], 0x1}, 0x7}], 0x7, 0x40002020, &(0x7f0000004ac0)={0x77359400}) (async) fchownat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xee00, 0x800) (async) open(&(0x7f0000000080)='./file0\x00', 0x402000, 0x109) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:06 executing program 3: mmap$xdp(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0, 0x30, 0xffffffffffffffff, 0x0) [ 1116.722670][T18926] loop4: detected capacity change from 0 to 545 [ 1116.729562][T18926] FAULT_INJECTION: forcing a failure. [ 1116.729562][T18926] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.742226][T18926] CPU: 0 PID: 18926 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1116.753279][T18926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.763371][T18926] Call Trace: [ 1116.766717][T18926] [ 1116.769642][T18926] dump_stack_lvl+0xd6/0x122 [ 1116.769874][T18928] 9pnet_fd: Insufficient options for proto=fd [ 1116.774278][T18926] dump_stack+0x11/0x1b [ 1116.784518][T18926] should_fail+0x23c/0x250 [ 1116.789013][T18926] ? __list_lru_init+0x352/0x6d0 [ 1116.793980][T18926] __should_failslab+0x81/0x90 [ 1116.798767][T18926] should_failslab+0x5/0x20 [ 1116.803409][T18926] kmem_cache_alloc_trace+0x52/0x350 [ 1116.808699][T18926] ? __list_lru_init+0x352/0x6d0 [ 1116.813660][T18926] __list_lru_init+0x352/0x6d0 [ 1116.818457][T18926] alloc_super+0x4a8/0x510 [ 1116.822874][T18926] ? get_tree_bdev+0x3d0/0x3d0 [ 1116.827642][T18926] sget_fc+0x1b3/0x450 [ 1116.831708][T18926] ? test_bdev_super_fc+0x40/0x40 [ 1116.836835][T18926] get_tree_bdev+0x1c2/0x3d0 [ 1116.837840][T18931] 9pnet_fd: Insufficient options for proto=fd [ 1116.841541][T18926] ? note_qf_name+0x140/0x140 [ 1116.841569][T18926] vfs_get_tree+0x4a/0x1a0 [ 1116.856647][T18926] path_mount+0x11cf/0x1c40 [ 1116.861209][T18926] ? kmem_cache_free+0x65/0x110 [ 1116.866069][T18926] __se_sys_mount+0x24b/0x2f0 [ 1116.870747][T18926] __x64_sys_mount+0x63/0x70 [ 1116.875348][T18926] do_syscall_64+0x44/0xd0 [ 1116.879762][T18926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1116.885690][T18926] RIP: 0033:0x7f533ffa557a [ 1116.890097][T18926] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1116.909858][T18926] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1116.918306][T18926] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1116.926278][T18926] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1116.934243][T18926] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1116.942283][T18926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1116.950254][T18926] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1116.958228][T18926] [ 1116.976167][T18935] loop5: detected capacity change from 0 to 545 [ 1116.981260][T18937] loop2: detected capacity change from 0 to 545 [ 1116.992256][T18935] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1116.992390][T18937] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:06 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xff000000}, 0x1c) 12:56:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_PUBL={0x4}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}]}]}, 0x28}}, 0x0) 12:56:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 95) 12:56:06 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (async) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{&(0x7f0000000140)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000000300)=""/221, 0xdd}, {&(0x7f0000000400)=""/143, 0x8f}, {&(0x7f00000004c0)=""/117, 0x75}, {&(0x7f00000000c0)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/192, 0xc0}, {&(0x7f0000001600)=""/78, 0x4e}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/98, 0x62}], 0x9, &(0x7f00000027c0)=""/99, 0x63}, 0x8}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000002840)=""/5, 0x5}, {&(0x7f0000002880)=""/12, 0xc}, {&(0x7f00000028c0)=""/248, 0xf8}, {&(0x7f00000029c0)=""/124, 0x7c}, {&(0x7f0000002a40)=""/191, 0xbf}], 0x6, &(0x7f0000002b80)=""/206, 0xce}, 0xffff}, {{&(0x7f0000002c80)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002d00)=""/10, 0xa}, {&(0x7f0000004b00)=""/89, 0x59}, {&(0x7f0000002dc0)=""/97, 0x61}, {&(0x7f0000002e40)=""/154, 0x9a}], 0x4, &(0x7f0000002f40)=""/83, 0x53}, 0x3}, {{0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000002fc0)=""/120, 0x78}, {&(0x7f0000003040)=""/124, 0x7c}, {&(0x7f00000030c0)=""/28, 0x1c}, {&(0x7f0000003100)=""/55, 0x37}, {&(0x7f0000003140)=""/38, 0x26}], 0x5}, 0x1}, {{&(0x7f0000003200)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004600)=[{&(0x7f0000003280)=""/91, 0x5b}, {&(0x7f0000003300)=""/167, 0xa7}, {&(0x7f00000033c0)=""/201, 0xc9}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/131, 0x83}, {&(0x7f0000004580)}, {&(0x7f00000045c0)=""/35, 0x23}], 0x7, &(0x7f0000004680)=""/1, 0x1}, 0x4}, {{0x0, 0x0, &(0x7f0000004740)=[{&(0x7f00000046c0)=""/114, 0x72}], 0x1, &(0x7f0000004780)=""/94, 0x5e}, 0x9c3}, {{&(0x7f0000004800)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f00000048c0)=[{&(0x7f0000004880)=""/7, 0x7}], 0x1}, 0x7}], 0x7, 0x40002020, &(0x7f0000004ac0)={0x77359400}) fchownat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0xee00, 0x800) (async) open(&(0x7f0000000080)='./file0\x00', 0x402000, 0x109) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc00000000000000) 12:56:06 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {0x0}], 0x2}, 0x0) 12:56:06 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) [ 1117.263740][T18947] loop5: detected capacity change from 0 to 545 [ 1117.265901][T18948] loop2: detected capacity change from 0 to 545 [ 1117.272322][T18952] loop4: detected capacity change from 0 to 545 [ 1117.292956][T18952] FAULT_INJECTION: forcing a failure. [ 1117.292956][T18952] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.305594][T18952] CPU: 1 PID: 18952 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1117.311013][ T24] audit: type=1400 audit(1646830566.789:521): avc: denied { write } for pid=18956 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1117.316613][T18952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.346246][T18952] Call Trace: [ 1117.349525][T18952] [ 1117.352468][T18952] dump_stack_lvl+0xd6/0x122 [ 1117.357088][T18952] dump_stack+0x11/0x1b [ 1117.361303][T18952] should_fail+0x23c/0x250 [ 1117.365720][T18952] ? __list_lru_init+0x352/0x6d0 [ 1117.370661][T18952] __should_failslab+0x81/0x90 [ 1117.375468][T18952] should_failslab+0x5/0x20 [ 1117.379981][T18952] kmem_cache_alloc_trace+0x52/0x350 [ 1117.385297][T18952] ? __list_lru_init+0x352/0x6d0 [ 1117.390266][T18952] __list_lru_init+0x352/0x6d0 [ 1117.395097][T18952] alloc_super+0x4a8/0x510 [ 1117.399545][T18952] ? get_tree_bdev+0x3d0/0x3d0 [ 1117.404322][T18952] sget_fc+0x1b3/0x450 [ 1117.408404][T18952] ? test_bdev_super_fc+0x40/0x40 [ 1117.413434][T18952] get_tree_bdev+0x1c2/0x3d0 [ 1117.418070][T18952] ? note_qf_name+0x140/0x140 [ 1117.422815][T18952] vfs_get_tree+0x4a/0x1a0 [ 1117.427325][T18952] path_mount+0x11cf/0x1c40 [ 1117.431828][T18952] ? kmem_cache_free+0x65/0x110 [ 1117.436687][T18952] __se_sys_mount+0x24b/0x2f0 [ 1117.441374][T18952] __x64_sys_mount+0x63/0x70 [ 1117.446044][T18952] do_syscall_64+0x44/0xd0 [ 1117.450472][T18952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1117.456366][T18952] RIP: 0033:0x7f533ffa557a [ 1117.460841][T18952] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1117.480448][T18952] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1117.488897][T18952] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1117.496870][T18952] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1117.504836][T18952] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 12:56:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) signalfd(r0, &(0x7f00000000c0)={[0x7ff]}, 0x8) (async) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) close(r1) (async) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x780080, @loopback, 0xfffffffe}, 0x1c) (async) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r3) (async) r4 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c77786403003d", @ANYRESHEX=r4, @ANYBLOB=',\x00']) (async) getsockopt$inet6_int(r3, 0x29, 0xd8, &(0x7f0000000040), &(0x7f0000000080)=0x4) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74726104358a61c08ccc62646e8646", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x6, 0x3) (async) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r5) (async) r6 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x10000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r5}}) (async) shutdown(r6, 0x0) 12:56:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xd00000000000000) 12:56:07 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xffff0000}, 0x1c) 12:56:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 12:56:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000080)="1ec4c98ac29a915715ca11159f6cba77a238876e52b1", 0x16, 0x3}, {&(0x7f00000000c0)="e08cbb3354609643cd830c4beb75", 0xe, 0xda}, {&(0x7f0000000300)="3504520ed10daf06fb6b411dccf8ad84260e7516efee0c9c56a904982919ce3e4dacba7008388daca26be8b18f0c8d499d657b194699e28a723cff3928a87714ab1e194ea34181ff9c7b1df6821ed6436dab90f22198bd2a2c8ea05db3c49beea82338fae45b1231beb347f4b26a5c741c6bd66d91e8850986242ebc79817a8fb4735d1251c149152cb9c52b9ed27153edc7216c9ad73234f9823fcdd75794b1c1c31c971a99a5292d11d3fd14987cb8f854ff9676785adaf920cef82e721d943717d41e2978c48d50ea9a211445fa3f048782c28e93d1f9d8ad2729", 0xdc, 0x1000}, {&(0x7f0000000140)="f77d0045033aae7c5efb07218a38e8406e0528250bee63c4ff9f6f817535947ac552bddd26e30297ec0caf16dc24c6f092976f55d0181597735b33fb1172473ff04e9d0a5603bc9b19b5d3359db996c4008aae286855a74618c15bae686263f179aa12f6e064f061bcb3b78f04d10caf0c871cd8dd55709ab83dfa0084b58faa9a1c94a70fe2bd9beafb94becf765aecbd28dcb71fe58364c250e01d07c778fc391a26d205bae3e9ef0552c164466f351054b217d2fb31982bb00a", 0xbb, 0x6}], 0x0, &(0x7f0000000300)=ANY=[]) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)=""/172, 0xac) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r1, r1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000017c0)={'syztnl0\x00', &(0x7f0000001740)={'syztnl1\x00', 0x0, 0x1f, 0x1, 0xffffffff, 0x2, {{0x17, 0x4, 0x0, 0x1f, 0x5c, 0x64, 0x0, 0x6, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ssrr={0x89, 0x23, 0x61, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast, @local, @empty, @broadcast, @rand_addr=0x64010100]}, @rr={0x7, 0xb, 0x47, [@broadcast, @remote]}, @rr={0x7, 0x17, 0x12, [@multicast1, @private=0xa010101, @rand_addr=0x64010100, @loopback, @multicast2]}]}}}}}) close(r3) r5 = socket(0x25, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setresuid(r6, r2, r2) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) lgetxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@known='security.apparmor\x00', &(0x7f0000001880)=""/217, 0xd9) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000001700)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x4}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) lchown(&(0x7f0000000280)='./file0\x00', r2, 0xffffffffffffffff) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) sendto(0xffffffffffffffff, &(0x7f00000005c0)="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", 0x1000, 0x4840, &(0x7f00000015c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) [ 1117.512809][T18952] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1117.520776][T18952] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1117.528746][T18952] [ 1117.533304][T18948] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1117.542220][T18947] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:07 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x1201000, 0x800}, 0x20) 12:56:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 96) 12:56:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xb1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x10000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x842b}, 0x1c) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0x2, 0x8) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x3, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f000000000000f1e041681846", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000010010200ca000000b00e00"], 0x140}}, 0x0) r7 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in6=@mcast1, 0x4e20, 0x5, 0x4e22, 0x0, 0x2, 0x0, 0x20, 0x2f, r6, r7}, {0x100, 0x4f6d, 0x3, 0x7, 0x6, 0x1f, 0x0, 0x5}, {0x8000, 0x7f, 0x3}, 0x4, 0x6e6bb9, 0x3, 0x1, 0x3, 0x3}, {{@in6=@private0, 0x4d6, 0x32}, 0x2, @in=@rand_addr=0x64010101, 0x3500, 0x1, 0x3, 0x6, 0x8, 0x1, 0x1}}, 0xe8) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1117.598612][T18977] loop2: detected capacity change from 0 to 545 [ 1117.605305][T18979] loop5: detected capacity change from 0 to 545 [ 1117.620150][T18977] ext4: Unknown parameter '5RѯûkAÌø­„&uïî œV©˜)Î>M¬ºp8¬¢kè± Ie{F™âŠr<ÿ9(¨w«N£Aÿœ{ö‚ÖCm«ò!˜½*' [ 1117.623047][T18983] loop4: detected capacity change from 0 to 545 12:56:07 executing program 3: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6068165f001c2b00fe8000000000000000000000000000aa0000000000000000000015"], 0x0) [ 1117.648167][T18983] FAULT_INJECTION: forcing a failure. [ 1117.648167][T18983] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.660899][T18983] CPU: 1 PID: 18983 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1117.671984][T18983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.682074][T18983] Call Trace: [ 1117.685394][T18983] [ 1117.688317][T18983] dump_stack_lvl+0xd6/0x122 [ 1117.692974][T18983] dump_stack+0x11/0x1b [ 1117.697225][T18983] should_fail+0x23c/0x250 [ 1117.700085][T18990] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1117.701635][T18983] ? __list_lru_init+0x352/0x6d0 [ 1117.715913][T18983] __should_failslab+0x81/0x90 [ 1117.720688][T18983] should_failslab+0x5/0x20 [ 1117.725191][T18983] kmem_cache_alloc_trace+0x52/0x350 [ 1117.730475][T18983] ? __list_lru_init+0x352/0x6d0 [ 1117.735506][T18983] __list_lru_init+0x352/0x6d0 [ 1117.740277][T18983] alloc_super+0x4a8/0x510 [ 1117.744743][T18983] ? get_tree_bdev+0x3d0/0x3d0 [ 1117.749551][T18983] sget_fc+0x1b3/0x450 [ 1117.753686][T18983] ? test_bdev_super_fc+0x40/0x40 [ 1117.758710][T18983] get_tree_bdev+0x1c2/0x3d0 [ 1117.763373][T18983] ? note_qf_name+0x140/0x140 [ 1117.768120][T18983] vfs_get_tree+0x4a/0x1a0 [ 1117.772577][T18983] path_mount+0x11cf/0x1c40 [ 1117.777123][T18983] ? kmem_cache_free+0x65/0x110 [ 1117.781978][T18983] __se_sys_mount+0x24b/0x2f0 [ 1117.786656][T18983] __x64_sys_mount+0x63/0x70 [ 1117.791244][T18983] do_syscall_64+0x44/0xd0 [ 1117.795668][T18983] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1117.801660][T18983] RIP: 0033:0x7f533ffa557a [ 1117.806120][T18983] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1117.814955][T18979] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1117.825720][T18983] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000080)="1ec4c98ac29a915715ca11159f6cba77a238876e52b1", 0x16, 0x3}, {&(0x7f00000000c0)="e08cbb3354609643cd830c4beb75", 0xe, 0xda}, {&(0x7f0000000300)="3504520ed10daf06fb6b411dccf8ad84260e7516efee0c9c56a904982919ce3e4dacba7008388daca26be8b18f0c8d499d657b194699e28a723cff3928a87714ab1e194ea34181ff9c7b1df6821ed6436dab90f22198bd2a2c8ea05db3c49beea82338fae45b1231beb347f4b26a5c741c6bd66d91e8850986242ebc79817a8fb4735d1251c149152cb9c52b9ed27153edc7216c9ad73234f9823fcdd75794b1c1c31c971a99a5292d11d3fd14987cb8f854ff9676785adaf920cef82e721d943717d41e2978c48d50ea9a211445fa3f048782c28e93d1f9d8ad2729", 0xdc, 0x1000}, {&(0x7f0000000140)="f77d0045033aae7c5efb07218a38e8406e0528250bee63c4ff9f6f817535947ac552bddd26e30297ec0caf16dc24c6f092976f55d0181597735b33fb1172473ff04e9d0a5603bc9b19b5d3359db996c4008aae286855a74618c15bae686263f179aa12f6e064f061bcb3b78f04d10caf0c871cd8dd55709ab83dfa0084b58faa9a1c94a70fe2bd9beafb94becf765aecbd28dcb71fe58364c250e01d07c778fc391a26d205bae3e9ef0552c164466f351054b217d2fb31982bb00a", 0xbb, 0x6}], 0x0, &(0x7f0000000300)=ANY=[]) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)=""/172, 0xac) (async) close(r0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) (async) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r1, r1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000017c0)={'syztnl0\x00', &(0x7f0000001740)={'syztnl1\x00', 0x0, 0x1f, 0x1, 0xffffffff, 0x2, {{0x17, 0x4, 0x0, 0x1f, 0x5c, 0x64, 0x0, 0x6, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ssrr={0x89, 0x23, 0x61, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast, @local, @empty, @broadcast, @rand_addr=0x64010100]}, @rr={0x7, 0xb, 0x47, [@broadcast, @remote]}, @rr={0x7, 0x17, 0x12, [@multicast1, @private=0xa010101, @rand_addr=0x64010100, @loopback, @multicast2]}]}}}}}) (async) close(r3) (async) r5 = socket(0x25, 0x1, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) setresuid(r6, r2, r2) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) (async) lgetxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@known='security.apparmor\x00', &(0x7f0000001880)=""/217, 0xd9) (async) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000001700)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x4}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) (async) lchown(&(0x7f0000000280)='./file0\x00', r2, 0xffffffffffffffff) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) sendto(0xffffffffffffffff, &(0x7f00000005c0)="872a2f2778151890fb689509817be84230ca217bf1616468dfae45d06e1dff5709612622f91ba5a00c31d574c144f523b160c179d2e5500d24f4011574927727b595dbc803577f4d53bf2de002b66e2cfd7d4e4898801936bad04c75176bb3c8e1c23bc76beedddf2236f5c452273d585490bb5781f93b44096c67d02cbeecfdc40f6b3be49ba908dc5b8edebab44ed8bc2541f7b40205baba99e8bbe213a3195f1283881afb2269473c6409769ba57eb636723eaba80cd66a294941783f7e93796acb489fd07490f10bee4699200e11dfc38d63d23ee28c6003b071dbb2e9b1b70ff02d34c97e506f6f1db6d5895b46b8af6224ed6781ef4e34637898cda107fcdd9a5ffd90834750c1cb8bde78135d4590b15455348e9a0a8a1d086794ccaa8b46f6db401dff37d9329b0cf1dab7d7893d5ba861c6f3fd35bef29891595e8fc8da8dd34cd0f9e88adced55140a09ef828f8efc96fb86f16ae8f745b521e0e7f08acd39e2b9945e30fad4d3f7dafa469ada9ae8ef953e8e1e0c04269aa9e334d655d5bf9130759940108ef20814ff5a02ec347629475fa8a84cdd04144e2f132a790267dab699f1c669b0c5e0a80336b0ce6753a0309395c47b37757bbdda95cd5341c9416843258b3e5ee6fa0f047f1e2893339d47178d514cba56a8fc1288bbf2ba6dc7c2a09f3f1893b543e762f638d3e8ce83a564368e6a6fa16b6433f6624c567206aa036ceae3f233eff3ba5f30d995b94481f4469730dfd25356744c776c63b60e381e7e9f5d4c824fd6cadcfe3d5dc9d672b52be7e47732469fd53c0d1f8a64768b7a38b8891fc5563d420a6c749129a429c44798a9e4f7d689ca901ab2b60711af8c815a00f179c09d6310b21205bf9a4622740d75ca42f0f73103a8c1fc930494364bbff480c66a90cd949598cea8a4e23d998e412602847f3cb4f0deb537cea995b368d62ddfba837b2c9178c19be8f4ec54c212dfc7319371e4f8eb95d3417e0fb5cbba408a9db9162f2588abc3c27cad4d92f20f8ba5e70cc88e896377cf4650f3e8e02b740bf7d5ceadfde96e6fcd7c5a3828d475c9e600c108bb5b02c9a50fab73f273e53c10e3ea2cd48a021a12806e9534246b726e8734cafb21358ab911e652857679f36168531004cf36f4f1c57e8150ce2734398781ecee6b929354c2249a049a4dbca2e58deb6f4378cbf77bc86d1c02b893f8443ee806d48eba287014086334c26fe9e61021cb060c3ba04a960c7708580d8c48ef57a9ed46dc9a7efca6a981bc1da8cfbb4103695e5af7916b0ab28c111fc920956f226b1a789ecac7767b973b0d8d6fbf447fdb4c33559a009b5f1ce2009b6b6cb65eb1a4547c531c4e96e5d6a12bda0cbf92d48568800c2ec1d0e0db3480edec84fb473cf33816ed5e20e5179fa5420fb5c2008dbf2feff83fc5e540c33a0bff47b064c42509be43c4e8edb41ecc1db090700efc325d3bd327ab68efa317a6b03e6e9ecb6b5e380cacf41a1f7a77eda55c5d2fbe7da14663330cdc1f7505e92445cb7297f8959004971506110e972fc055d4bcee37f78b518e09a606b2f09947d942e14a22ce6466ab5f4ff1ac4d5875177dc01910af6f0844e8368719e4365e7c85821545591ee9f458f9582fd869462db572c3b892c565e01edcc85bf3e4dcdacc67dfead4304af42977e34f61d48c0a004c10443ce563715b736ec5d81e8a71fb86ecfcbfd6f4008dd8dc8064ab1e7ebc1e4ceb77f0619219d9d6ced32f82cdbc26d8199ecbcb2242964b6c0114828552a3ec1e30d1a52f84226997db5932ed6aface3654e257cf6ca59fc43e669c78094b4cb9125d8055a3b01e488fb1159c2643507a4112068e673505a9b946cb38e931604818accaffbb7fbf06873f7b2fc0d4fe05cd952f435f81e8174bd497212f39e26475efc92c6b8acff80f59387cb1d6869446a3fe4302efe21795dac61c6444fc5ca33cf99ad0cbc25f3381227038b24bd22196c28dbb612ae9813847634cbb76060ad8a03ac37f2e91b75a5535984705187bb660697b6c986b4181cf4c1e4433d7659d9d66f7e10bdb94a0bc93df8e0738b450eec6a61de357abe840557808c28d4656e26c09e6e669c85303c76b03fbe76973970a14d5f77e9d8e7085371a80cfab0ad57daf54b5158d9783a5f06d1b8ae9f84821c7c02ff7079a9eb1c8b72e24d1547eb6eb4ea53a30aa1dfb2aada0c90d2fab173b7a524a229c71a870abacd1866fd4d66e436a8696a5cac6802524985e060aeae4d31f644996f53e304e942df4c6d5f528a04522224b1c4785f45feb23b8b4b21a20a89c15bfe9a88bad09e3cf1acaaaacf292fabd451834ba2fb05b94afe9eeb4f046394dd9de7f9ff72fed1884c9ce6adad730d2a57d12d5e3b40c960f6fb640d48ec6c077af29f1877ffda4cc456a10821e8804895a112d6866023bcb48fdb5e98d583309b73a54f89fb7a8bc95d6fd2d36c78e0a65c5d78d4d1bac304a3b666115bed20e80b93a2fbc8dacce54b6e6dc31ea627a693ced17045500f5fefff592a316e91aa284f200b1586f4c69a39435850716910c9a38b5b3edfac6550b8fc8cf09e64e29da1a779817b96ec1c5f111482579a5692dce48c54b9c5292166dbaaf6c9b192a1d6a6c44556a04368e0d4e6afabe7c845f39ff85e80f4b95419ac8658489bec32593d2ae7148a40e57623968384e2b5c0febdb274bf5d5a932dfb29b4b40897e02651b77c8075eafa56e74f7cd79c8099e549efcfd8248c8295052f122046ac7ad4bb84829fc603cda400fcd9d1ff8f36000781bc6a0a3104859f399b363caa5bf562ac50a3e356519c87749c1da5679f0ed9fcac14d6a4a50382716b8ffd56db2814e9458f44d6a0dbb94f2cc18284319013f4837430d38d0227f48726b32c6888021ee6af29e5bf6e1006e37b6a6ad8113f93966a85e130fc1788d31f056e685a2fa42fa44dd325ef17531975dea1594dd155e028a5178d59be88fe6b4e92aa1474f18705572cf416a22cf3c031fbf1b8b86f62d4eb225fd4e3d4672955d2d4d176723563d8e0281904003952fa7baeed3339bbba0f4bb49d1b4838bd5bfd3ccbb97acaebbcaac18754a3832f10b50fe278ab4d6cf114994788dd840646e0739ede8cbf0c3573df1c99675146d20b24da2aba46be2b01256fae9abe35d09a07e0e0a5bebe16a4dbc3aeced57f97cff60ee068559b9282319090fb1969ab8d519e81d8ce3461739b52b0f57e95e7de74395355a2a676403aae2495bb344c85235a1803dec048977485240084dfcc644f4f1e7232a353b9b11df6f59a2416ee10279b2b1e2223e35103df83f1b3b551cbe13ef16ef2a8f1999c0073404a6dda34fc49aa20bd0de075fb2cdd3f2601d2618b84ca519665471c5d30e38b956a6a3b11c3cde6679b756ba33d4445c03a2f76602ca551e1d929991495f4aeae35881d4656c4a552961b9ad5a19dafc303feda11580e349004de019d225b6d44b1c29ba6b6ce01eda06a056e2e38897bce9ce403872d1db3c5999d7b92e1affd33146451f501cec10f007748f6322fa0eb9188c5a355551c18a9d2d6fd5382ee0777e657c66cf8cb869ce928e01dd2a5fa3572ab7e41a0f2b0e408a081d315c54252b33fbde5f568ba33e44bab0e77aac372852aebd46dd9014d1d13becf46c18a1859a1eb6f162609a556489283033f8bb5fcea14473fe4c6d8e6d3854b03ff1a9089e0ca7470a3c949dd42db3d34c2deaf7a48f0cd1e61808ae29dffa3f3f2427a6a739a7b697b7c24a53c54146ef5f0427b6ab56a287c58dc71732c00535b3ea27996045c499fb4ff18b077bf7a7d4f9ed5fe9c36ed5a6a1365596e9008ee55be034f12ef138bcd08e4b3ca261baf30a38b44062992ed1ff04ef9429561df4ea36e5a85bc90e693fdb2a18bdc349a68d1f1a79ba0cbde1cc39d82913eef7b9e186d42407e4111c6da21377a707293a3076a6ef303c9f9e02fd471f6641419866dc441283d5de6669ff09207e319f7d0672cdde9f4a41069dfa392d669345844db6365d0aa82848ddd10bbd2843ede8170274a1a310ab8a84b45f733abfcbebcdd447eb2e28b9158622ba7c903e0fbcd8ec9dd367d2af6e3f3f7f1e896617147f1f9825ccf9d66f8f50016ae7483b05681b978e5cd2ecd353d32ac21fe3875e4006a1685c38c5c5fa9d051071dc408bd0a83a887634ee2914e8b1923b809d857848b1f98bce3fb4ae01e82269db60ac0c7498819647588c2e95625a755bb86096bc54f11fc913e628b937c3d88659c0eb5039affd79e6a103d0248a63a7a7a228628486c310351e9b7993f2030f1f37a6839b540751e45efd8774382e7b534663ebe112d04f17a53e59e02aa7fefe2b66a615b6e45e12380041b9373a7d04d0c34b911efb8c5a310e12899d5060a1fe9dda106cb25b69b2e50b40e1f5562465667c7fdb7130c9155816426050651e6e42f78c2c063d53c855102bd7aeec9234e80ce87c32be5d52ad84fa300504134f3dd1ce556caa89eb40618bee5e5360dd8b03394e80bf328728b75d53f252dc42be0fa8e6dc5a84335467d659c0b0cdea936eb5e1d0807183c6e916646588ad877d1dd8becb71e64763d8e0e362a9008752b3ad40382eff1ad7815ba4a064babd884d67aa93a68ea0ad3febf8c80e3a43e784b07e73977536928ed8a0810a7ca08f874b48f599b7d755f00f7df292f57b17db74ca45400db4ed48c3169ae96f5e7e172b44abfe2016a92ded0980c4f2e9614b4e717ff3c851132a5976fb842492f0dec54c2ab86d266ae63b9c8c481a828571fe1850c477d754f883e8e91f9054db0c6caf1710cecc12a035a9a292fe844b860a0f02e4a4bcc75f30a9084d6999a7b6eb87c673c5fa4de7b160c34b886106732ed8fe94f267bc4c1eb4314b3c78e000a5dd5f2c4ab63c882b9812be3ea91605fad60e95700b560ee46698cf6da6d631411db380efb1c34607a0cb7d9c2ca71542a5b8a1e176986442c82b9eaf69a2ea420a12250252ee02437a8827c3fbc32ab5c3e2596c893eb3505dd409990aec220d27b362c08a1e442013211e90f4e94181d716344d65d83e127959523e01efb05d0b119dcc3b4a50a339715249051bd3084b0dbfe449d0e1f1c690da85de399afb4ceb6594cb2238b4bc1da2274cf47564885d60d7089ffed83facab7fc10621c506693523745fc930b2643d66f43fbd1f3cff2eb60d25f2cadca8a0bd642b613cee6e141ca4fd81976b260d1e2de539d4e61420a5d30cd68402c1654a253b17e0e1346746d873fd2e140b55b0a2f560db160e2941a3cc7fe87cfd312d80a1a3320014625dc61b81e592522b0456b2bead74db10d39c35bd760da4dfcdd9fe756bae4f418c22d82452a01b8c7c3a6cdc39c3c944ac2b0a4b5536cd6469810a6c10921e678cc0f0140d100ea2f32c78a204dea825e6877335a8859bcea60d11c2004c49fd7bb13db821752259da91b49df0953a11b8a4bda6f5439d2c0fd252827e9cf19b5f9289bcd9b9d4ca1e6c62ea196fe4609b2759fad936c79a43b7d440bd592214372cf9af7bcbd2a126979c7aeb0b4677ea10bd23dfca9bd39ce50b6b01ca3b2045603a12fc4ba19a891fb07ad2bce1366530ce57f792f04a9f0f0baa86ff9e824610b94873104adbe8cf973a2f30a5ab3f9ad0f7e517349baa8caf6210f327dcf5544301298b0ffbb57807acb234e5b81f25254c2aeee0bcc4ab0c9d4673e8a10b2083e71e3a582c40d34d2d4d694341a9496ef6d884ec58045d3b12", 0x1000, 0x4840, &(0x7f00000015c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) [ 1117.825757][T18983] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1117.850514][T18983] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1117.858481][T18983] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1117.866449][T18983] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1117.874530][T18983] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1117.882516][T18983] 12:56:07 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:56:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) [ 1117.907502][T18993] loop2: detected capacity change from 0 to 545 [ 1117.921208][T18993] ext4: Unknown parameter '5RѯûkAÌø­„&uïî œV©˜)Î>M¬ºp8¬¢kè± Ie{F™âŠr<ÿ9(¨w«N£Aÿœ{ö‚ÖCm«ò!˜½*' 12:56:07 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x1a2a8, 0x4) 12:56:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xe00000000000000) [ 1117.960994][T18998] 9pnet_fd: Insufficient options for proto=fd [ 1117.983561][T19005] loop5: detected capacity change from 0 to 545 [ 1117.997742][T19005] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:07 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xffff80fe}, 0x1c) 12:56:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 97) 12:56:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000080)) 12:56:07 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000080)="1ec4c98ac29a915715ca11159f6cba77a238876e52b1", 0x16, 0x3}, {&(0x7f00000000c0)="e08cbb3354609643cd830c4beb75", 0xe, 0xda}, {&(0x7f0000000300)="3504520ed10daf06fb6b411dccf8ad84260e7516efee0c9c56a904982919ce3e4dacba7008388daca26be8b18f0c8d499d657b194699e28a723cff3928a87714ab1e194ea34181ff9c7b1df6821ed6436dab90f22198bd2a2c8ea05db3c49beea82338fae45b1231beb347f4b26a5c741c6bd66d91e8850986242ebc79817a8fb4735d1251c149152cb9c52b9ed27153edc7216c9ad73234f9823fcdd75794b1c1c31c971a99a5292d11d3fd14987cb8f854ff9676785adaf920cef82e721d943717d41e2978c48d50ea9a211445fa3f048782c28e93d1f9d8ad2729", 0xdc, 0x1000}, {&(0x7f0000000140)="f77d0045033aae7c5efb07218a38e8406e0528250bee63c4ff9f6f817535947ac552bddd26e30297ec0caf16dc24c6f092976f55d0181597735b33fb1172473ff04e9d0a5603bc9b19b5d3359db996c4008aae286855a74618c15bae686263f179aa12f6e064f061bcb3b78f04d10caf0c871cd8dd55709ab83dfa0084b58faa9a1c94a70fe2bd9beafb94becf765aecbd28dcb71fe58364c250e01d07c778fc391a26d205bae3e9ef0552c164466f351054b217d2fb31982bb00a", 0xbb, 0x6}], 0x0, &(0x7f0000000300)=ANY=[]) (async) lgetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.nlink\x00', &(0x7f0000000500)=""/172, 0xac) close(r0) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) (async) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = dup2(r1, r1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000017c0)={'syztnl0\x00', &(0x7f0000001740)={'syztnl1\x00', 0x0, 0x1f, 0x1, 0xffffffff, 0x2, {{0x17, 0x4, 0x0, 0x1f, 0x5c, 0x64, 0x0, 0x6, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ssrr={0x89, 0x23, 0x61, [@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @broadcast, @local, @empty, @broadcast, @rand_addr=0x64010100]}, @rr={0x7, 0xb, 0x47, [@broadcast, @remote]}, @rr={0x7, 0x17, 0x12, [@multicast1, @private=0xa010101, @rand_addr=0x64010100, @loopback, @multicast2]}]}}}}}) (async) close(r3) (async) r5 = socket(0x25, 0x1, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) (async) setresuid(r6, r2, r2) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) (async) lgetxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@known='security.apparmor\x00', &(0x7f0000001880)=""/217, 0xd9) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000001700)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x9, 0x4}}}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) lchown(&(0x7f0000000280)='./file0\x00', r2, 0xffffffffffffffff) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) sendto(0xffffffffffffffff, &(0x7f00000005c0)="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", 0x1000, 0x4840, &(0x7f00000015c0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 12:56:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf00000000000000) [ 1118.433036][T19012] loop5: detected capacity change from 0 to 545 [ 1118.434691][T19013] loop2: detected capacity change from 0 to 545 [ 1118.449994][T19016] loop4: detected capacity change from 0 to 545 [ 1118.460380][T19013] ext4: Unknown parameter '5RѯûkAÌø­„&uïî œV©˜)Î>M¬ºp8¬¢kè± Ie{F™âŠr<ÿ9(¨w«N£Aÿœ{ö‚ÖCm«ò!˜½*' [ 1118.461620][T19016] FAULT_INJECTION: forcing a failure. [ 1118.461620][T19016] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.473398][T19012] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1118.485339][T19016] CPU: 0 PID: 19016 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1118.504808][T19016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.514858][T19016] Call Trace: [ 1118.518138][T19016] [ 1118.521068][T19016] dump_stack_lvl+0xd6/0x122 [ 1118.525745][T19016] dump_stack+0x11/0x1b [ 1118.529899][T19016] should_fail+0x23c/0x250 [ 1118.534322][T19016] ? __list_lru_init+0x352/0x6d0 [ 1118.539284][T19016] __should_failslab+0x81/0x90 [ 1118.544135][T19016] should_failslab+0x5/0x20 [ 1118.548640][T19016] kmem_cache_alloc_trace+0x52/0x350 [ 1118.554015][T19016] ? __list_lru_init+0x352/0x6d0 [ 1118.558961][T19016] __list_lru_init+0x352/0x6d0 [ 1118.563846][T19016] alloc_super+0x4a8/0x510 [ 1118.568275][T19016] ? get_tree_bdev+0x3d0/0x3d0 [ 1118.573074][T19016] sget_fc+0x1b3/0x450 [ 1118.577186][T19016] ? test_bdev_super_fc+0x40/0x40 [ 1118.582298][T19016] get_tree_bdev+0x1c2/0x3d0 [ 1118.586888][T19016] ? note_qf_name+0x140/0x140 [ 1118.591628][T19016] vfs_get_tree+0x4a/0x1a0 [ 1118.596107][T19016] path_mount+0x11cf/0x1c40 [ 1118.600674][T19016] ? kmem_cache_free+0x65/0x110 [ 1118.605561][T19016] __se_sys_mount+0x24b/0x2f0 [ 1118.610318][T19016] __x64_sys_mount+0x63/0x70 [ 1118.614904][T19016] do_syscall_64+0x44/0xd0 [ 1118.619315][T19016] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1118.625220][T19016] RIP: 0033:0x7f533ffa557a [ 1118.629664][T19016] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1118.649345][T19016] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1118.657819][T19016] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1118.665818][T19016] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1118.673797][T19016] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 12:56:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xb1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x10000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x842b}, 0x1c) (async) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) (async) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0x2, 0x8) (async) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x3, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f000000000000f1e041681846", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000010010200ca000000b00e00"], 0x140}}, 0x0) r7 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in6=@mcast1, 0x4e20, 0x5, 0x4e22, 0x0, 0x2, 0x0, 0x20, 0x2f, r6, r7}, {0x100, 0x4f6d, 0x3, 0x7, 0x6, 0x1f, 0x0, 0x5}, {0x8000, 0x7f, 0x3}, 0x4, 0x6e6bb9, 0x3, 0x1, 0x3, 0x3}, {{@in6=@private0, 0x4d6, 0x32}, 0x2, @in=@rand_addr=0x64010101, 0x3500, 0x1, 0x3, 0x6, 0x8, 0x1, 0x1}}, 0xe8) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) 12:56:08 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000140)="4c01a0bf5f1c5384876cb09632f7fa5f3b52fba8c96c301b0e3b57a896ab2f744921ce2f14ee9c564d291c5e07a1e6093a5d02ff00d8c9776ca62942542f609c565fe95ca10b809d01b22c355a82d07786608b1b4dbf0a6f332d0f203c8e48849c4294857b3d3f46ad221a5cae3e14a1166d9f49ccf41385c5749becf13af2804d1438ffbf626055655e0b09d6391273270587b5bce2f6a64dc1b3a5a40309ea45ca5c267ef0e41518d04939089c2c72bdfbe414", 0xb4, 0x2}, {&(0x7f0000000300)="170ec7095e057669756c0163e277406c9a18b306f77aad544fc7731a2a3f99a811e2e2ef80b296a9699acfc94e3a729dfe76f0579afb880f57d240d964745c0d9cd2420d99602e903e28dd36d7a8080278fe5fd322b611256a67cf301599b577223eb2ffcf87f26c569d22ef13690bb3dc91741d5671c00ea2a9bac9842336ee67e5da4b4b14211da4a63ed91aec1e3e82d1b8511f388fd5ec00da99c8b038a4a368c68f9fecc5937f861bf0a2f474c011f473e96480d859810b57b0b413371ba767b64e39d1862a2b0f9fc155bc6a978cb37281b57023bf8501de700e61e06116939fd95e2d18c34c1848162d21a30b9dded5", 0xf3, 0x9}], 0x0, &(0x7f00000000c0)=ANY=[]) close(r0) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1118.681767][T19016] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1118.689774][T19016] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1118.697782][T19016] 12:56:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 98) 12:56:08 executing program 3: socketpair(0x2, 0xa, 0xfe, &(0x7f0000000500)) 12:56:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1000000000000000) [ 1118.745258][T19027] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1118.761753][T19032] loop4: detected capacity change from 0 to 545 [ 1118.776367][T19030] loop2: detected capacity change from 0 to 545 [ 1118.783761][T19032] FAULT_INJECTION: forcing a failure. [ 1118.783761][T19032] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.796416][T19032] CPU: 1 PID: 19032 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1118.807431][T19032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.817626][T19032] Call Trace: [ 1118.820900][T19032] [ 1118.823076][T19036] loop5: detected capacity change from 0 to 545 [ 1118.823820][T19032] dump_stack_lvl+0xd6/0x122 [ 1118.834768][T19032] dump_stack+0x11/0x1b [ 1118.838920][T19032] should_fail+0x23c/0x250 [ 1118.843327][T19032] ? __list_lru_init+0x352/0x6d0 [ 1118.848247][T19032] __should_failslab+0x81/0x90 [ 1118.853037][T19032] should_failslab+0x5/0x20 [ 1118.857657][T19032] kmem_cache_alloc_trace+0x52/0x350 [ 1118.862927][T19032] ? __list_lru_init+0x352/0x6d0 [ 1118.867862][T19032] __list_lru_init+0x352/0x6d0 [ 1118.872609][T19032] alloc_super+0x4a8/0x510 [ 1118.877029][T19032] ? get_tree_bdev+0x3d0/0x3d0 [ 1118.881905][T19032] sget_fc+0x1b3/0x450 [ 1118.886007][T19032] ? test_bdev_super_fc+0x40/0x40 [ 1118.891030][T19032] get_tree_bdev+0x1c2/0x3d0 [ 1118.895743][T19032] ? note_qf_name+0x140/0x140 [ 1118.900407][T19032] vfs_get_tree+0x4a/0x1a0 [ 1118.904888][T19032] path_mount+0x11cf/0x1c40 [ 1118.909375][T19032] ? kmem_cache_free+0x65/0x110 [ 1118.914213][T19032] __se_sys_mount+0x24b/0x2f0 [ 1118.918873][T19032] ? __this_cpu_preempt_check+0x18/0x20 [ 1118.924438][T19032] __x64_sys_mount+0x63/0x70 [ 1118.929037][T19032] do_syscall_64+0x44/0xd0 [ 1118.933459][T19032] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1118.939335][T19032] RIP: 0033:0x7f533ffa557a [ 1118.943733][T19032] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1118.963400][T19032] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1118.971808][T19032] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1118.979820][T19032] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1118.987775][T19032] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 12:56:08 executing program 3: socketpair(0x2, 0xa, 0xfe, &(0x7f0000000500)) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, 0x0, 0x0) [ 1118.995771][T19032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1119.003724][T19032] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1119.011695][T19032] [ 1119.032927][T19030] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1119.050026][T19036] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1119.054882][T19030] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1119.074162][T19030] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 12:56:08 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xffffc0fe}, 0x1c) 12:56:08 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x17}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 12:56:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1100000000000000) 12:56:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 99) 12:56:08 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000140)="4c01a0bf5f1c5384876cb09632f7fa5f3b52fba8c96c301b0e3b57a896ab2f744921ce2f14ee9c564d291c5e07a1e6093a5d02ff00d8c9776ca62942542f609c565fe95ca10b809d01b22c355a82d07786608b1b4dbf0a6f332d0f203c8e48849c4294857b3d3f46ad221a5cae3e14a1166d9f49ccf41385c5749becf13af2804d1438ffbf626055655e0b09d6391273270587b5bce2f6a64dc1b3a5a40309ea45ca5c267ef0e41518d04939089c2c72bdfbe414", 0xb4, 0x2}, {&(0x7f0000000300)="170ec7095e057669756c0163e277406c9a18b306f77aad544fc7731a2a3f99a811e2e2ef80b296a9699acfc94e3a729dfe76f0579afb880f57d240d964745c0d9cd2420d99602e903e28dd36d7a8080278fe5fd322b611256a67cf301599b577223eb2ffcf87f26c569d22ef13690bb3dc91741d5671c00ea2a9bac9842336ee67e5da4b4b14211da4a63ed91aec1e3e82d1b8511f388fd5ec00da99c8b038a4a368c68f9fecc5937f861bf0a2f474c011f473e96480d859810b57b0b413371ba767b64e39d1862a2b0f9fc155bc6a978cb37281b57023bf8501de700e61e06116939fd95e2d18c34c1848162d21a30b9dded5", 0xf3, 0x9}], 0x0, &(0x7f00000000c0)=ANY=[]) close(r0) chdir(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f00000002c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000140)="4c01a0bf5f1c5384876cb09632f7fa5f3b52fba8c96c301b0e3b57a896ab2f744921ce2f14ee9c564d291c5e07a1e6093a5d02ff00d8c9776ca62942542f609c565fe95ca10b809d01b22c355a82d07786608b1b4dbf0a6f332d0f203c8e48849c4294857b3d3f46ad221a5cae3e14a1166d9f49ccf41385c5749becf13af2804d1438ffbf626055655e0b09d6391273270587b5bce2f6a64dc1b3a5a40309ea45ca5c267ef0e41518d04939089c2c72bdfbe414", 0xb4, 0x2}, {&(0x7f0000000300)="170ec7095e057669756c0163e277406c9a18b306f77aad544fc7731a2a3f99a811e2e2ef80b296a9699acfc94e3a729dfe76f0579afb880f57d240d964745c0d9cd2420d99602e903e28dd36d7a8080278fe5fd322b611256a67cf301599b577223eb2ffcf87f26c569d22ef13690bb3dc91741d5671c00ea2a9bac9842336ee67e5da4b4b14211da4a63ed91aec1e3e82d1b8511f388fd5ec00da99c8b038a4a368c68f9fecc5937f861bf0a2f474c011f473e96480d859810b57b0b413371ba767b64e39d1862a2b0f9fc155bc6a978cb37281b57023bf8501de700e61e06116939fd95e2d18c34c1848162d21a30b9dded5", 0xf3, 0x9}], 0x0, &(0x7f00000000c0)=ANY=[]) (async) close(r0) (async) chdir(&(0x7f0000000080)='./file0\x00') (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) [ 1119.303083][T19045] loop4: detected capacity change from 0 to 545 [ 1119.307480][ T24] audit: type=1400 audit(1646830568.799:522): avc: denied { bind } for pid=19043 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1119.309990][T19047] loop5: detected capacity change from 0 to 545 [ 1119.347500][T19052] loop2: detected capacity change from 0 to 545 [ 1119.348901][T19045] FAULT_INJECTION: forcing a failure. [ 1119.348901][T19045] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.366534][T19045] CPU: 1 PID: 19045 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1119.368373][T19052] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1119.377574][T19045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.377587][T19045] Call Trace: [ 1119.377593][T19045] [ 1119.377605][T19045] dump_stack_lvl+0xd6/0x122 [ 1119.377634][T19045] dump_stack+0x11/0x1b [ 1119.387866][T19052] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1119.396144][T19045] should_fail+0x23c/0x250 [ 1119.399434][T19052] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1119.402348][T19045] ? ext4_fill_super+0x2f/0x2f0 [ 1119.448166][T19045] __should_failslab+0x81/0x90 [ 1119.452937][T19045] should_failslab+0x5/0x20 [ 1119.457491][T19045] kmem_cache_alloc_trace+0x52/0x350 [ 1119.462774][T19045] ext4_fill_super+0x2f/0x2f0 [ 1119.467457][T19045] get_tree_bdev+0x2c2/0x3d0 [ 1119.472123][T19045] ? note_qf_name+0x140/0x140 [ 1119.476825][T19045] vfs_get_tree+0x4a/0x1a0 [ 1119.481288][T19045] path_mount+0x11cf/0x1c40 [ 1119.485817][T19045] ? kmem_cache_free+0x65/0x110 [ 1119.490670][T19045] __se_sys_mount+0x24b/0x2f0 [ 1119.495350][T19045] __x64_sys_mount+0x63/0x70 [ 1119.499942][T19045] do_syscall_64+0x44/0xd0 [ 1119.504372][T19045] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1119.510416][T19045] RIP: 0033:0x7f533ffa557a [ 1119.514823][T19045] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1119.534563][T19045] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1119.543097][T19045] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1119.551065][T19045] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1119.559037][T19045] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1119.567003][T19045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1119.575046][T19045] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1119.583016][T19045] [ 1119.587710][T19056] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. 12:56:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xb1) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x10000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x842b}, 0x1c) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r2) r3 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0x2, 0x8) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x3, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async) getsockname$packet(r5, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f000000000000f1e041681846", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000010010200ca000000b00e00"], 0x140}}, 0x0) (async) r7 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in6=@mcast1, 0x4e20, 0x5, 0x4e22, 0x0, 0x2, 0x0, 0x20, 0x2f, r6, r7}, {0x100, 0x4f6d, 0x3, 0x7, 0x6, 0x1f, 0x0, 0x5}, {0x8000, 0x7f, 0x3}, 0x4, 0x6e6bb9, 0x3, 0x1, 0x3, 0x3}, {{@in6=@private0, 0x4d6, 0x32}, 0x2, @in=@rand_addr=0x64010101, 0x3500, 0x1, 0x3, 0x6, 0x8, 0x1, 0x1}}, 0xe8) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:09 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) connect$pppl2tp(r0, 0x0, 0x7) [ 1119.603494][T19056] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1119.628633][T19057] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. 12:56:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000000100)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x16c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x168, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x8, 0x101}}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0xd, 0xa, "08c346e86fb95fb14e"}, @NL80211_WOWLAN_TCP_WAKE_PAYLOAD={0xb7, 0xa, "9394059045df450c0febbcbd12a4f2483bd64d3ab34556a5c409f12529ad6c235efb0245a1c49e43e332d6bacf812676002913c07cc97b3db5420acbe18dc07b4d7cc539104e60d3b57958f5ef7c149fd0b0e4b5ce2b1db1370c084e74b3fa14a5772fd0ab55551800e7d0ad52066302c9d373091134a9e67dd0693d221b9c6ee7811f8d3e099724cc3fa5586697c8793bb0759e5ead6698cea34564347c953d016a8f7f4ae6688474f2c7104ed07b80e37da3"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x8a, 0x8, {0x80000000, 0x0, "d6caac16161dd98aa20538351ce5388dd99ac3154e99a81d0301534cf3444e5d9fa11c31bb1435a639ae0bff883e5e1784d5ba7b7ba0371f7e919cad761e609708d964d7f51fb3fa3da34e883bb4b9e1f9aef968339873edf709db3675bebda6a9c3c6276f8090738b84de409785177e2980e06bef316c7b5297d3cbb449"}}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0xd38, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x30, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x4, 0x1}}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x10, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="016be9cc1312"}]}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x178, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FLAGS={0x8}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6}, @NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x3f}]}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac=@device_b}, @NL80211_ATTR_IE={0x132, 0x2a, [@cf={0x4, 0x6, {0x0, 0x0, 0x134, 0x4}}, @mesh_id={0x72, 0x6}, @mesh_id={0x72, 0x6}, @random={0x1, 0xef, "ff06f4a40d8c4a21813fb4706df47be7cbb81dcbfd41fe5d4114cf14c879114f20e717ecc320e5fd1cd197993768763eb89e2f37ce74c24543e6b2729c938084f0199ed5d2600a1d00da26600a1a0949700a744b98a125fbfcc589edd4bd0dff086dcdc84ee334d3e7b77f037076367b7f0176e84977e9d3a742c14f281415ab2e92c4436d7e0c3d4b0aaa8372540c911903eb59baaca7bb3b6af289136c6d63c0c8c1aee57d0248fe03a5e646a919e78607c989f4c5ea9f37ced08279cd5f32dc09a171af3a14e81101800d5575db1dcc9836ad622178c08e66199e9cea5cb2d7ba693e17a8cf042c9615699428b7"}, @dsss={0x3, 0x1}, @peer_mgmt={0x75, 0x18, {0x1, 0x4, @val, @val, @val="e56f791800535a7052bb3554ea985d29"}}, @mesh_chsw={0x76, 0x6, {0x80, 0x0, 0x0, 0x7}}]}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x200}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0xc42}]}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xb80, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_WAKE_MASK={0xb7a, 0xb, "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"}]}]}]}, 0xec4}}, 0x4000) 12:56:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (fail_nth: 100) [ 1119.644401][T19057] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1119.661902][T19064] netlink: 244 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1119.670493][T19047] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:09 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @private2}}}, 0x3a) 12:56:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1200000000000000) [ 1119.709609][T19070] loop4: detected capacity change from 0 to 545 [ 1119.727860][T19070] FAULT_INJECTION: forcing a failure. [ 1119.727860][T19070] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.740547][T19070] CPU: 0 PID: 19070 Comm: syz-executor.4 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1119.751564][T19070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.761616][T19070] Call Trace: [ 1119.764894][T19070] [ 1119.767823][T19070] dump_stack_lvl+0xd6/0x122 [ 1119.772445][T19070] dump_stack+0x11/0x1b [ 1119.776606][T19070] should_fail+0x23c/0x250 [ 1119.781091][T19070] ? mempool_alloc_slab+0x16/0x20 [ 1119.786211][T19070] __should_failslab+0x81/0x90 [ 1119.791041][T19070] should_failslab+0x5/0x20 [ 1119.795543][T19070] kmem_cache_alloc+0x4f/0x320 [ 1119.800307][T19070] mempool_alloc_slab+0x16/0x20 [ 1119.805171][T19070] ? mempool_free+0x130/0x130 [ 1119.809853][T19070] mempool_alloc+0x9d/0x310 [ 1119.814351][T19070] bio_alloc_bioset+0xcc/0x560 [ 1119.819115][T19070] ? __find_get_block+0x8b4/0x9b0 [ 1119.824144][T19070] submit_bh_wbc+0x133/0x320 [ 1119.828751][T19070] ? __getblk_gfp+0x493/0x530 [ 1119.833466][T19070] submit_bh+0x21/0x30 [ 1119.837539][T19070] ext4_read_bh+0xc7/0x130 [ 1119.841981][T19070] ext4_sb_bread_unmovable+0xc7/0x160 [ 1119.847401][T19070] __ext4_fill_super+0x195/0x59b0 [ 1119.852534][T19070] ? vsnprintf+0xe8f/0xed0 [ 1119.857037][T19070] ? kmem_cache_alloc_trace+0x24b/0x350 [ 1119.862581][T19070] ? ext4_fill_super+0x5c/0x2f0 [ 1119.867430][T19070] ext4_fill_super+0x10b/0x2f0 [ 1119.872204][T19070] get_tree_bdev+0x2c2/0x3d0 [ 1119.876904][T19070] ? note_qf_name+0x140/0x140 [ 1119.881639][T19070] vfs_get_tree+0x4a/0x1a0 [ 1119.886114][T19070] path_mount+0x11cf/0x1c40 [ 1119.890616][T19070] ? kmem_cache_free+0x65/0x110 [ 1119.895465][T19070] __se_sys_mount+0x24b/0x2f0 [ 1119.900148][T19070] ? __this_cpu_preempt_check+0x18/0x20 [ 1119.905713][T19070] __x64_sys_mount+0x63/0x70 [ 1119.910383][T19070] do_syscall_64+0x44/0xd0 [ 1119.914801][T19070] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1119.920698][T19070] RIP: 0033:0x7f533ffa557a [ 1119.925164][T19070] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1119.944853][T19070] RSP: 002b:00007f533f119f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) [ 1119.953300][T19070] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f533ffa557a [ 1119.961266][T19070] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f533f119fe0 [ 1119.969232][T19070] RBP: 00007f533f11a020 R08: 00007f533f11a020 R09: 0000000020000000 [ 1119.977446][T19070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1119.985506][T19070] R13: 0000000020000100 R14: 00007f533f119fe0 R15: 0000000020000300 [ 1119.993567][T19070] [ 1120.015631][T19076] loop5: detected capacity change from 0 to 545 [ 1120.028677][T19076] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1120.037579][T19070] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1120.052403][T19070] EXT4-fs (loop4): get root inode failed [ 1120.058063][T19070] EXT4-fs (loop4): mount failed 12:56:09 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xffffff8d}, 0x1c) 12:56:09 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000400)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f0000000140)="4c01a0bf5f1c5384876cb09632f7fa5f3b52fba8c96c301b0e3b57a896ab2f744921ce2f14ee9c564d291c5e07a1e6093a5d02ff00d8c9776ca62942542f609c565fe95ca10b809d01b22c355a82d07786608b1b4dbf0a6f332d0f203c8e48849c4294857b3d3f46ad221a5cae3e14a1166d9f49ccf41385c5749becf13af2804d1438ffbf626055655e0b09d6391273270587b5bce2f6a64dc1b3a5a40309ea45ca5c267ef0e41518d04939089c2c72bdfbe414", 0xb4, 0x2}, {&(0x7f0000000300)="170ec7095e057669756c0163e277406c9a18b306f77aad544fc7731a2a3f99a811e2e2ef80b296a9699acfc94e3a729dfe76f0579afb880f57d240d964745c0d9cd2420d99602e903e28dd36d7a8080278fe5fd322b611256a67cf301599b577223eb2ffcf87f26c569d22ef13690bb3dc91741d5671c00ea2a9bac9842336ee67e5da4b4b14211da4a63ed91aec1e3e82d1b8511f388fd5ec00da99c8b038a4a368c68f9fecc5937f861bf0a2f474c011f473e96480d859810b57b0b413371ba767b64e39d1862a2b0f9fc155bc6a978cb37281b57023bf8501de700e61e06116939fd95e2d18c34c1848162d21a30b9dded5", 0xf3, 0x9}], 0x0, &(0x7f00000000c0)=ANY=[]) close(r0) chdir(&(0x7f0000000080)='./file0\x00') (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:09 executing program 3: getuid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xe, 0x0, 0x0, 0x7}, 0x48) 12:56:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x1902000000000000) 12:56:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1120.194905][T19085] loop2: detected capacity change from 0 to 545 [ 1120.195553][T19086] loop5: detected capacity change from 0 to 545 [ 1120.207936][T19084] loop4: detected capacity change from 0 to 545 [ 1120.219455][T19085] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1120.244237][T19084] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1120.257998][T19086] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1120.266769][T19093] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1120.282485][T19093] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1120.297554][T19084] EXT4-fs (loop4): get root inode failed [ 1120.303283][T19084] EXT4-fs (loop4): mount failed 12:56:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="f39821f99d0a5141c9579e6c9bff7937926725e96985edd3b93a7792ed0089c971cd5e1840eaaa3bd3f6a6eb773ba414500057c856d42a553841334ed2376d314ffd489a63e598b3", 0x48, 0x50, &(0x7f0000000180)={0xa, 0x4e20, 0x7fffffff, @rand_addr=' \x01\x00', 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="bc4ce74008167c945c96ee9830260688bd064d73e2b614ebdf038854a092b3f45b99c75bf22dceca8c93ed5a7acd6a90f42c6dd0a0b74ab0c357776bb77bda00c4a20a765e06cd560c93cf9583aad984e76146e4b13ee0190e3c3059f84387dbcb18145ab8158686040ba0f716cc7f080d71b74241bf85cb9e3f1bfee8124dde7d16b0fc5841efa626d3f70e3168bf128776e9c1fe9b96d33cbd296747de0a85fb024f", 0xa3, 0x801, &(0x7f0000000140)={0xa, 0x4e21, 0xffff6e52, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) 12:56:10 executing program 3: socketpair(0x23, 0x0, 0x7, &(0x7f0000000000)) 12:56:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2000000000000000) 12:56:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x142) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x4000000) open(&(0x7f0000000140)='./file0\x00', 0x18182, 0x10) splice(0xffffffffffffffff, &(0x7f00000003c0)=0x13, r0, &(0x7f0000000400)=0x1f, 0x200000000000000, 0x8) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="24001354f21cab7c4e6c9dd84f2b11e800000000000036bb140ecc1476806091817c71d18d00b3ebd9575f66ce0000000000", @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf2507000000080002003c00695a0a61000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x4) 12:56:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1120.508603][T19100] loop5: detected capacity change from 0 to 545 [ 1120.510586][ T24] audit: type=1400 audit(1646830569.999:523): avc: denied { create } for pid=19095 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1120.515420][T19101] loop2: detected capacity change from 0 to 545 [ 1120.535923][T19102] loop4: detected capacity change from 0 to 545 12:56:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="f39821f99d0a5141c9579e6c9bff7937926725e96985edd3b93a7792ed0089c971cd5e1840eaaa3bd3f6a6eb773ba414500057c856d42a553841334ed2376d314ffd489a63e598b3", 0x48, 0x50, &(0x7f0000000180)={0xa, 0x4e20, 0x7fffffff, @rand_addr=' \x01\x00', 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="bc4ce74008167c945c96ee9830260688bd064d73e2b614ebdf038854a092b3f45b99c75bf22dceca8c93ed5a7acd6a90f42c6dd0a0b74ab0c357776bb77bda00c4a20a765e06cd560c93cf9583aad984e76146e4b13ee0190e3c3059f84387dbcb18145ab8158686040ba0f716cc7f080d71b74241bf85cb9e3f1bfee8124dde7d16b0fc5841efa626d3f70e3168bf128776e9c1fe9b96d33cbd296747de0a85fb024f", 0xa3, 0x801, &(0x7f0000000140)={0xa, 0x4e21, 0xffff6e52, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) socket$nl_sock_diag(0x10, 0x3, 0x4) (async) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x4, 0x4) (async) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000000200)="f39821f99d0a5141c9579e6c9bff7937926725e96985edd3b93a7792ed0089c971cd5e1840eaaa3bd3f6a6eb773ba414500057c856d42a553841334ed2376d314ffd489a63e598b3", 0x48, 0x50, &(0x7f0000000180)={0xa, 0x4e20, 0x7fffffff, @rand_addr=' \x01\x00', 0x1}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000000080)="bc4ce74008167c945c96ee9830260688bd064d73e2b614ebdf038854a092b3f45b99c75bf22dceca8c93ed5a7acd6a90f42c6dd0a0b74ab0c357776bb77bda00c4a20a765e06cd560c93cf9583aad984e76146e4b13ee0190e3c3059f84387dbcb18145ab8158686040ba0f716cc7f080d71b74241bf85cb9e3f1bfee8124dde7d16b0fc5841efa626d3f70e3168bf128776e9c1fe9b96d33cbd296747de0a85fb024f", 0xa3, 0x801, &(0x7f0000000140)={0xa, 0x4e21, 0xffff6e52, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) (async) 12:56:10 executing program 3: socket(0x18, 0x0, 0x100) [ 1120.552222][T19100] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1120.566459][T19101] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1120.584011][T19102] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1120.601845][T19102] EXT4-fs (loop4): get root inode failed [ 1120.607497][T19102] EXT4-fs (loop4): mount failed 12:56:10 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xffffffe0}, 0x1c) 12:56:10 executing program 3: socketpair(0x2, 0x2, 0x1, &(0x7f0000000380)) 12:56:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="f39821f99d0a5141c9579e6c9bff7937926725e96985edd3b93a7792ed0089c971cd5e1840eaaa3bd3f6a6eb773ba414500057c856d42a553841334ed2376d314ffd489a63e598b3", 0x48, 0x50, &(0x7f0000000180)={0xa, 0x4e20, 0x7fffffff, @rand_addr=' \x01\x00', 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000080)="bc4ce74008167c945c96ee9830260688bd064d73e2b614ebdf038854a092b3f45b99c75bf22dceca8c93ed5a7acd6a90f42c6dd0a0b74ab0c357776bb77bda00c4a20a765e06cd560c93cf9583aad984e76146e4b13ee0190e3c3059f84387dbcb18145ab8158686040ba0f716cc7f080d71b74241bf85cb9e3f1bfee8124dde7d16b0fc5841efa626d3f70e3168bf128776e9c1fe9b96d33cbd296747de0a85fb024f", 0xa3, 0x801, &(0x7f0000000140)={0xa, 0x4e21, 0xffff6e52, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) socket$nl_sock_diag(0x10, 0x3, 0x4) (async) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000040)=0x4, 0x4) (async) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000000200)="f39821f99d0a5141c9579e6c9bff7937926725e96985edd3b93a7792ed0089c971cd5e1840eaaa3bd3f6a6eb773ba414500057c856d42a553841334ed2376d314ffd489a63e598b3", 0x48, 0x50, &(0x7f0000000180)={0xa, 0x4e20, 0x7fffffff, @rand_addr=' \x01\x00', 0x1}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) sendto$inet6(r0, &(0x7f0000000080)="bc4ce74008167c945c96ee9830260688bd064d73e2b614ebdf038854a092b3f45b99c75bf22dceca8c93ed5a7acd6a90f42c6dd0a0b74ab0c357776bb77bda00c4a20a765e06cd560c93cf9583aad984e76146e4b13ee0190e3c3059f84387dbcb18145ab8158686040ba0f716cc7f080d71b74241bf85cb9e3f1bfee8124dde7d16b0fc5841efa626d3f70e3168bf128776e9c1fe9b96d33cbd296747de0a85fb024f", 0xa3, 0x801, &(0x7f0000000140)={0xa, 0x4e21, 0xffff6e52, @private0={0xfc, 0x0, '\x00', 0x1}}, 0x1c) (async) 12:56:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2102000000000000) 12:56:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000300)='./file0\x00', 0x142) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x4000000) open(&(0x7f0000000140)='./file0\x00', 0x18182, 0x10) splice(0xffffffffffffffff, &(0x7f00000003c0)=0x13, r0, &(0x7f0000000400)=0x1f, 0x200000000000000, 0x8) (async, rerun: 32) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="24001354f21cab7c4e6c9dd84f2b11e800000000000036bb140ecc1476806091817c71d18d00b3ebd9575f66ce0000000000", @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf2507000000080002003c00695a0a61000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x4) (rerun: 32) 12:56:10 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/66, 0x204000, 0x1000, 0x2}, 0x20) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0}, 0x20) 12:56:10 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) r1 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@ipv6_newaddrlabel={0x7c, 0x48, 0x300, 0x70bd25, 0x25dfdbff, {0xa, 0x0, 0x0, 0x0, 0x0, 0x20}, [@IFAL_LABEL={0x8, 0x2, 0x6}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x43}}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0xc0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x820000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}, {@cache_fscache}, {@fscache}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '}*\\[%]\'\\\'{,^'}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@subj_type={'subj_type', 0x3d, 'rfdno'}}, {@smackfsfloor}, {@dont_appraise}, {@uid_gt={'uid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1121.087563][T19134] loop5: detected capacity change from 0 to 545 [ 1121.088401][T19136] loop4: detected capacity change from 0 to 545 [ 1121.100483][T19137] loop2: detected capacity change from 0 to 545 [ 1121.130518][T19134] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1121.151438][T19136] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1121.153867][T19137] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1121.171650][T19136] EXT4-fs (loop4): get root inode failed 12:56:10 executing program 3: r0 = epoll_create1(0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 12:56:10 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xffffff7f, 0x800}, 0x20) 12:56:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2200000000000000) [ 1121.177363][T19136] EXT4-fs (loop4): mount failed 12:56:10 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x40, 0x0) [ 1121.215644][T19157] loop5: detected capacity change from 0 to 545 [ 1121.238867][T19157] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:11 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty, 0xfffffff5}, 0x1c) 12:56:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:11 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x100000000) 12:56:11 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x142) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x4000000) (async) open(&(0x7f0000000140)='./file0\x00', 0x18182, 0x10) (async) splice(0xffffffffffffffff, &(0x7f00000003c0)=0x13, r0, &(0x7f0000000400)=0x1f, 0x200000000000000, 0x8) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="24001354f21cab7c4e6c9dd84f2b11e800000000000036bb140ecc1476806091817c71d18d00b3ebd9575f66ce0000000000", @ANYRES16=r1, @ANYBLOB="04002abd7000ffdbdf2507000000080002003c00695a0a61000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x4) 12:56:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x2300000000000000) 12:56:11 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 12:56:11 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) r1 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (async) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@ipv6_newaddrlabel={0x7c, 0x48, 0x300, 0x70bd25, 0x25dfdbff, {0xa, 0x0, 0x0, 0x0, 0x0, 0x20}, [@IFAL_LABEL={0x8, 0x2, 0x6}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x43}}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0xc0) (async) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x820000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}, {@cache_fscache}, {@fscache}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '}*\\[%]\'\\\'{,^'}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@subj_type={'subj_type', 0x3d, 'rfdno'}}, {@smackfsfloor}, {@dont_appraise}, {@uid_gt={'uid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) (async) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1121.977169][T19166] loop5: detected capacity change from 0 to 545 [ 1121.980639][T19168] loop4: detected capacity change from 0 to 545 [ 1121.985432][T19163] loop2: detected capacity change from 0 to 545 12:56:11 executing program 3: sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket(0x0, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x3c, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000340), 0xfffffffc, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x402, r0}, 0x38) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) 12:56:11 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) r1 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (async, rerun: 32) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=@ipv6_newaddrlabel={0x7c, 0x48, 0x300, 0x70bd25, 0x25dfdbff, {0xa, 0x0, 0x0, 0x0, 0x0, 0x20}, [@IFAL_LABEL={0x8, 0x2, 0x6}, @IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x43}}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0xc0) (rerun: 32) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 32) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x820000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}, {@cache_fscache}, {@fscache}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, '}*\\[%]\'\\\'{,^'}}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@subj_type={'subj_type', 0x3d, 'rfdno'}}, {@smackfsfloor}, {@dont_appraise}, {@uid_gt={'uid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}]}}) (rerun: 32) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1122.028586][T19166] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1122.037858][T19163] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1122.058163][T19168] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:56:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x3f00000000000000) 12:56:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) [ 1122.081939][T19168] EXT4-fs (loop4): get root inode failed [ 1122.087613][T19168] EXT4-fs (loop4): mount failed 12:56:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1122.135528][T19195] loop5: detected capacity change from 0 to 545 [ 1122.156746][T19197] loop4: detected capacity change from 0 to 545 [ 1122.180512][T19197] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1122.181991][T19195] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1122.202394][T19197] EXT4-fs (loop4): get root inode failed [ 1122.208065][T19197] EXT4-fs (loop4): mount failed 12:56:12 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x2) 12:56:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:12 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f00000009c0)='./file0/file0/file0\x00', 0xa801, 0x190) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="181861716343be7bb10f360cbc19da706149385be84579a2206b9e11ff89c04d69021194b484cf4b26a3c11034e42dea5eb69f6a9facbfcc045ad882b7a38cbaf3db116d370640a9c5b144932723ef076bfa1b91e456ed295c0981b0f3cfbd312a9d6f7138f029a7ceb34c539f02f820b1663a54367ebbe074588515be46dcd981eb7367a0fe8284ea9e47907cabbbbccb080a67c5476996e5289e5fdb9a5cf8b02c28adfc8ca0d90fe5be6f75d25f96f2e27aaa27502b15bbece2b8f4986d8be133c7e37ea00fb8dd61a1d5f056de0522f2fbbd120ced46ebcc1e5968", 0xdd}, {&(0x7f0000000b80)="e0637aaf036b8cb7f7aa81cb8b0d67eced1d105607ef7fe43a9dbc968311b2756bacc63090dfe9cea604c71d2c", 0x2d, 0xfff}], 0x187df2a4a95ea7a3, &(0x7f0000000c00)={[{@utf8no}], [{@fowner_lt={'fowner<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ',\x00'}}]}) setresgid(r3, 0x0, 0x0) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x9, &(0x7f0000000700)=[{&(0x7f0000000140)="7fdbcaa00a9228adccda7a", 0xb}, {&(0x7f0000000180)="2cd234cd977bfd9499d4aab4792c6adcf2034d3a677ea40c344667e946803b2a4a2caa65317e82290403255238ba2bfcc5abbe1b43b7bb16", 0x38, 0x4}, {&(0x7f0000000300)="ee2c0d22370eda0bc5fe99be84e90b25633321994fd997d908c4e9e897083880ce5ab5f0355f40263ba7c327c6fb3fd786f6477e503d28f90667c2985dbc13aef6198342205ad6f2f128e203821c6daa37a45a5fbf0ef2bd62fa1035296eefc807d9dd23a1bf86e93350ea3fbde8dc23b91d59795ec8c4f78c54ed7220821f65d6ef77b288739d5d5d044d7666679d77bf2bd7016458b37c3f02c835a0bc321eaca88092cbefb7e45e8d76dc8cfec1fa9a7ea828114e4a1b95a944286650bb5c0a2d6e30a06c08d6", 0xc8, 0x6}, {&(0x7f00000001c0)="55f78a54ba77d2bba045a969c8e37b3aaa9ef047f669e5e4cd10aa561eb61e4ed59a4a7f8d793ccc", 0x28, 0x4}, {&(0x7f0000000400)="247162fba3f7db7300dba44912299de4828376ec0b3db85b5728cc4e966d43b0ede43c912e06473b94abe8e1d84369f89abafd401b4305f1f8a43d9a657c5bd707618fd052784298694f54c5845468cef98aa8e135eab475d09bb92982a1ff08bd4b0f665ca7422696013627d2936ccccd3a1c16ad26d02721cf7f425399674d59a5499462f9c382ad51bbd9bda94d1b3a3f9b02699ad85343d921aecebc1a3135fe21277599d72943ea423d493c39", 0xaf, 0x7fffffff}, {&(0x7f00000004c0)="3c0aa62b78d1e7302a5a686f5c8f692fd200a8534e000caa1201fbcff2afbfac363f999f0469719412395d3a37893f8c19ed5fecedc9fa441f32017c0c9e6185f1343e325a9c616e23873e93212c1187c5661357b355289f2fff3c03063620893fdb55fe3ea61a4e0cbbb04921d8d43458ecc2a0f84be7701acad73fdf696dc6dfa1e02f48c289ea33c40429eb8074847421a9", 0x93, 0xdd2}, {&(0x7f0000000580)="6ebcf9537fda2e5bfa684496e8b6b6046df98f81969a53e7068b0b2d217e3000ab81d9ff9fc51f106a9ca54c9b94d206e286114d5d76426a1a95a725e09b9113b336eb7cb4b97d721b6560c930591f4589f4ae45350103b251d988db6ca37c8735a8cae7a6e5537373ab283320709c503bd5687d705b906b36b9c353e378c2e8bb582e265e5496c66e832c0fe8f173", 0x8f, 0x4}, {&(0x7f0000000640)="e7156ad10e0cd165353b9ce2f20859f028228e852d63cbda810ed88e19694fc2b40fe69b2269bd05e7bb327b5ba25a0f577f19a5e3fb3a2caa34a6a2285ff70740b899", 0x43, 0x4}, {&(0x7f00000006c0)="98aa90", 0x3, 0xb7}], 0x1000405, &(0x7f00000008c0)={[{}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x37, 0x31, 0x6d, 0x25, 0x37]}}, {@size={'size', 0x3d, [0x36, 0x32, 0x6d, 0x35, 0x25, 0x35, 0x39, 0x34]}}, {@gid={'gid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80}}, {@euid_lt={'euid<', r4}}, {@subj_user={'subj_user', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r6}}]}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000000000000000) 12:56:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@private0, @in6=@private1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:12 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x18) [ 1122.862933][T19203] loop2: detected capacity change from 0 to 545 [ 1122.870113][T19206] loop4: detected capacity change from 0 to 545 [ 1122.878272][T19210] loop5: detected capacity change from 0 to 545 [ 1122.895420][T19203] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1122.913930][T19203] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1122.929697][T19203] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1122.951212][T19206] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1122.968447][T19210] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1122.969875][T19206] EXT4-fs (loop4): get root inode failed [ 1122.982576][T19206] EXT4-fs (loop4): mount failed 12:56:12 executing program 3: sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) socket(0x0, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x3c, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000340), 0xfffffffc, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x402, r0}, 0x38) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) 12:56:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @local, 0x1f}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x10001}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x7fffffff) 12:56:12 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f00000009c0)='./file0/file0/file0\x00', 0xa801, 0x190) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="181861716343be7bb10f360cbc19da706149385be84579a2206b9e11ff89c04d69021194b484cf4b26a3c11034e42dea5eb69f6a9facbfcc045ad882b7a38cbaf3db116d370640a9c5b144932723ef076bfa1b91e456ed295c0981b0f3cfbd312a9d6f7138f029a7ceb34c539f02f820b1663a54367ebbe074588515be46dcd981eb7367a0fe8284ea9e47907cabbbbccb080a67c5476996e5289e5fdb9a5cf8b02c28adfc8ca0d90fe5be6f75d25f96f2e27aaa27502b15bbece2b8f4986d8be133c7e37ea00fb8dd61a1d5f056de0522f2fbbd120ced46ebcc1e5968", 0xdd}, {&(0x7f0000000b80)="e0637aaf036b8cb7f7aa81cb8b0d67eced1d105607ef7fe43a9dbc968311b2756bacc63090dfe9cea604c71d2c", 0x2d, 0xfff}], 0x187df2a4a95ea7a3, &(0x7f0000000c00)={[{@utf8no}], [{@fowner_lt={'fowner<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ',\x00'}}]}) setresgid(r3, 0x0, 0x0) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x9, &(0x7f0000000700)=[{&(0x7f0000000140)="7fdbcaa00a9228adccda7a", 0xb}, {&(0x7f0000000180)="2cd234cd977bfd9499d4aab4792c6adcf2034d3a677ea40c344667e946803b2a4a2caa65317e82290403255238ba2bfcc5abbe1b43b7bb16", 0x38, 0x4}, {&(0x7f0000000300)="ee2c0d22370eda0bc5fe99be84e90b25633321994fd997d908c4e9e897083880ce5ab5f0355f40263ba7c327c6fb3fd786f6477e503d28f90667c2985dbc13aef6198342205ad6f2f128e203821c6daa37a45a5fbf0ef2bd62fa1035296eefc807d9dd23a1bf86e93350ea3fbde8dc23b91d59795ec8c4f78c54ed7220821f65d6ef77b288739d5d5d044d7666679d77bf2bd7016458b37c3f02c835a0bc321eaca88092cbefb7e45e8d76dc8cfec1fa9a7ea828114e4a1b95a944286650bb5c0a2d6e30a06c08d6", 0xc8, 0x6}, {&(0x7f00000001c0)="55f78a54ba77d2bba045a969c8e37b3aaa9ef047f669e5e4cd10aa561eb61e4ed59a4a7f8d793ccc", 0x28, 0x4}, {&(0x7f0000000400)="247162fba3f7db7300dba44912299de4828376ec0b3db85b5728cc4e966d43b0ede43c912e06473b94abe8e1d84369f89abafd401b4305f1f8a43d9a657c5bd707618fd052784298694f54c5845468cef98aa8e135eab475d09bb92982a1ff08bd4b0f665ca7422696013627d2936ccccd3a1c16ad26d02721cf7f425399674d59a5499462f9c382ad51bbd9bda94d1b3a3f9b02699ad85343d921aecebc1a3135fe21277599d72943ea423d493c39", 0xaf, 0x7fffffff}, {&(0x7f00000004c0)="3c0aa62b78d1e7302a5a686f5c8f692fd200a8534e000caa1201fbcff2afbfac363f999f0469719412395d3a37893f8c19ed5fecedc9fa441f32017c0c9e6185f1343e325a9c616e23873e93212c1187c5661357b355289f2fff3c03063620893fdb55fe3ea61a4e0cbbb04921d8d43458ecc2a0f84be7701acad73fdf696dc6dfa1e02f48c289ea33c40429eb8074847421a9", 0x93, 0xdd2}, {&(0x7f0000000580)="6ebcf9537fda2e5bfa684496e8b6b6046df98f81969a53e7068b0b2d217e3000ab81d9ff9fc51f106a9ca54c9b94d206e286114d5d76426a1a95a725e09b9113b336eb7cb4b97d721b6560c930591f4589f4ae45350103b251d988db6ca37c8735a8cae7a6e5537373ab283320709c503bd5687d705b906b36b9c353e378c2e8bb582e265e5496c66e832c0fe8f173", 0x8f, 0x4}, {&(0x7f0000000640)="e7156ad10e0cd165353b9ce2f20859f028228e852d63cbda810ed88e19694fc2b40fe69b2269bd05e7bb327b5ba25a0f577f19a5e3fb3a2caa34a6a2285ff70740b899", 0x43, 0x4}, {&(0x7f00000006c0)="98aa90", 0x3, 0xb7}], 0x1000405, &(0x7f00000008c0)={[{}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x37, 0x31, 0x6d, 0x25, 0x37]}}, {@size={'size', 0x3d, [0x36, 0x32, 0x6d, 0x35, 0x25, 0x35, 0x39, 0x34]}}, {@gid={'gid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80}}, {@euid_lt={'euid<', r4}}, {@subj_user={'subj_user', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r6}}]}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (async) close(r0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) open(&(0x7f00000009c0)='./file0/file0/file0\x00', 0xa801, 0x190) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000440)=0xc) (async) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="181861716343be7bb10f360cbc19da706149385be84579a2206b9e11ff89c04d69021194b484cf4b26a3c11034e42dea5eb69f6a9facbfcc045ad882b7a38cbaf3db116d370640a9c5b144932723ef076bfa1b91e456ed295c0981b0f3cfbd312a9d6f7138f029a7ceb34c539f02f820b1663a54367ebbe074588515be46dcd981eb7367a0fe8284ea9e47907cabbbbccb080a67c5476996e5289e5fdb9a5cf8b02c28adfc8ca0d90fe5be6f75d25f96f2e27aaa27502b15bbece2b8f4986d8be133c7e37ea00fb8dd61a1d5f056de0522f2fbbd120ced46ebcc1e5968", 0xdd}, {&(0x7f0000000b80)="e0637aaf036b8cb7f7aa81cb8b0d67eced1d105607ef7fe43a9dbc968311b2756bacc63090dfe9cea604c71d2c", 0x2d, 0xfff}], 0x187df2a4a95ea7a3, &(0x7f0000000c00)={[{@utf8no}], [{@fowner_lt={'fowner<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ',\x00'}}]}) (async) setresgid(r3, 0x0, 0x0) (async) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) (async) setuid(r6) (async) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x9, &(0x7f0000000700)=[{&(0x7f0000000140)="7fdbcaa00a9228adccda7a", 0xb}, {&(0x7f0000000180)="2cd234cd977bfd9499d4aab4792c6adcf2034d3a677ea40c344667e946803b2a4a2caa65317e82290403255238ba2bfcc5abbe1b43b7bb16", 0x38, 0x4}, {&(0x7f0000000300)="ee2c0d22370eda0bc5fe99be84e90b25633321994fd997d908c4e9e897083880ce5ab5f0355f40263ba7c327c6fb3fd786f6477e503d28f90667c2985dbc13aef6198342205ad6f2f128e203821c6daa37a45a5fbf0ef2bd62fa1035296eefc807d9dd23a1bf86e93350ea3fbde8dc23b91d59795ec8c4f78c54ed7220821f65d6ef77b288739d5d5d044d7666679d77bf2bd7016458b37c3f02c835a0bc321eaca88092cbefb7e45e8d76dc8cfec1fa9a7ea828114e4a1b95a944286650bb5c0a2d6e30a06c08d6", 0xc8, 0x6}, {&(0x7f00000001c0)="55f78a54ba77d2bba045a969c8e37b3aaa9ef047f669e5e4cd10aa561eb61e4ed59a4a7f8d793ccc", 0x28, 0x4}, {&(0x7f0000000400)="247162fba3f7db7300dba44912299de4828376ec0b3db85b5728cc4e966d43b0ede43c912e06473b94abe8e1d84369f89abafd401b4305f1f8a43d9a657c5bd707618fd052784298694f54c5845468cef98aa8e135eab475d09bb92982a1ff08bd4b0f665ca7422696013627d2936ccccd3a1c16ad26d02721cf7f425399674d59a5499462f9c382ad51bbd9bda94d1b3a3f9b02699ad85343d921aecebc1a3135fe21277599d72943ea423d493c39", 0xaf, 0x7fffffff}, {&(0x7f00000004c0)="3c0aa62b78d1e7302a5a686f5c8f692fd200a8534e000caa1201fbcff2afbfac363f999f0469719412395d3a37893f8c19ed5fecedc9fa441f32017c0c9e6185f1343e325a9c616e23873e93212c1187c5661357b355289f2fff3c03063620893fdb55fe3ea61a4e0cbbb04921d8d43458ecc2a0f84be7701acad73fdf696dc6dfa1e02f48c289ea33c40429eb8074847421a9", 0x93, 0xdd2}, {&(0x7f0000000580)="6ebcf9537fda2e5bfa684496e8b6b6046df98f81969a53e7068b0b2d217e3000ab81d9ff9fc51f106a9ca54c9b94d206e286114d5d76426a1a95a725e09b9113b336eb7cb4b97d721b6560c930591f4589f4ae45350103b251d988db6ca37c8735a8cae7a6e5537373ab283320709c503bd5687d705b906b36b9c353e378c2e8bb582e265e5496c66e832c0fe8f173", 0x8f, 0x4}, {&(0x7f0000000640)="e7156ad10e0cd165353b9ce2f20859f028228e852d63cbda810ed88e19694fc2b40fe69b2269bd05e7bb327b5ba25a0f577f19a5e3fb3a2caa34a6a2285ff70740b899", 0x43, 0x4}, {&(0x7f00000006c0)="98aa90", 0x3, 0xb7}], 0x1000405, &(0x7f00000008c0)={[{}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x37, 0x31, 0x6d, 0x25, 0x37]}}, {@size={'size', 0x3d, [0x36, 0x32, 0x6d, 0x35, 0x25, 0x35, 0x39, 0x34]}}, {@gid={'gid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80}}, {@euid_lt={'euid<', r4}}, {@subj_user={'subj_user', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r6}}]}) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) 12:56:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4000080000000000) 12:56:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @local, 0x1f}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x10001}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x7fffffff) socket$inet6(0xa, 0x3, 0x6) (async) pidfd_getfd(0xffffffffffffffff, r0, 0x0) (async) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @local, 0x1f}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x10001}, 0x1c) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x7fffffff) (async) [ 1123.332500][T19227] loop5: detected capacity change from 0 to 545 [ 1123.336357][T19225] loop2: detected capacity change from 0 to 545 [ 1123.339218][T19229] loop4: detected capacity change from 0 to 545 [ 1123.358524][T19227] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @local, 0x1f}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x10001}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x7fffffff) socket$inet6(0xa, 0x3, 0x6) (async) pidfd_getfd(0xffffffffffffffff, r0, 0x0) (async) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @local, 0x1f}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty, 0x10001}, 0x1c) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) sendfile(r0, r0, &(0x7f0000000040)=0x3, 0x7fffffff) (async) 12:56:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4400000000000000) [ 1123.389623][T19229] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1123.391692][T19225] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1123.411657][T19229] EXT4-fs (loop4): get root inode failed [ 1123.417304][T19229] EXT4-fs (loop4): mount failed [ 1123.438219][T19250] loop5: detected capacity change from 0 to 545 [ 1123.447204][T19233] ================================================================== [ 1123.455284][T19233] BUG: KCSAN: data-race in __bpf_lru_list_shrink / __htab_lru_percpu_map_update_elem [ 1123.464746][T19233] [ 1123.467059][T19233] write to 0xffff88812e87bee3 of 1 bytes by task 19248 on cpu 0: [ 1123.474760][T19233] __htab_lru_percpu_map_update_elem+0x49d/0x880 [ 1123.481084][T19233] bpf_percpu_hash_update+0x5a/0x90 [ 1123.486287][T19233] bpf_map_update_value+0x1dd/0x2f0 [ 1123.491583][T19233] generic_map_update_batch+0x364/0x4c0 [ 1123.497138][T19233] bpf_map_do_batch+0x33e/0x3a0 [ 1123.501984][T19233] __sys_bpf+0x9b4/0xa3c0 [ 1123.506323][T19233] __x64_sys_bpf+0x3f/0x50 [ 1123.510749][T19233] do_syscall_64+0x44/0xd0 [ 1123.515163][T19233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1123.521050][T19233] [ 1123.523368][T19233] read to 0xffff88812e87bee3 of 1 bytes by task 19233 on cpu 1: [ 1123.530989][T19233] __bpf_lru_list_shrink+0xc4/0x750 [ 1123.536192][T19233] bpf_lru_pop_free+0x9fa/0xef0 [ 1123.541037][T19233] __htab_lru_percpu_map_update_elem+0xeb/0x880 [ 1123.547272][T19233] bpf_percpu_hash_update+0x5a/0x90 [ 1123.552471][T19233] bpf_map_update_value+0x1dd/0x2f0 [ 1123.557680][T19233] generic_map_update_batch+0x364/0x4c0 [ 1123.563229][T19233] bpf_map_do_batch+0x33e/0x3a0 [ 1123.568075][T19233] __sys_bpf+0x9b4/0xa3c0 [ 1123.572401][T19233] __x64_sys_bpf+0x3f/0x50 [ 1123.576824][T19233] do_syscall_64+0x44/0xd0 [ 1123.581229][T19233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1123.587118][T19233] [ 1123.589430][T19233] value changed: 0x00 -> 0x01 [ 1123.594090][T19233] [ 1123.596401][T19233] Reported by Kernel Concurrency Sanitizer on: [ 1123.602536][T19233] CPU: 1 PID: 19233 Comm: syz-executor.3 Not tainted 5.17.0-rc7-syzkaller-00060-g92f90cc9fe0e-dirty #0 [ 1123.613580][T19233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.623627][T19233] ================================================================== 12:56:13 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) sendto$inet6(r0, &(0x7f0000000040)="9dca8b25238ee033b18751dccc30576e2ba63557d18fad804cd0bc12b24a0dfb542f00f25a9823a2c27c6c1173d39a0fcc30b4ba1385b2776de21aabb1d3cc8a5a2879dad73704395bb90fddc009e31730f2e1a231f948e7423166a15269c461615fe5fc846e5848016d3e60270ecbe31b098cef3497c2ceb5b855bc8b7ff76f1201505e39901983855b915b978101d9ffb7051ce081231d71f16bdb5124d2b30ddf95acf06d33c6d12dcd84e3ead339bcb106e98757224d7384e850100e0793f79721c2aa30abc89996a311da6eec44e739099b6103f5eaf233c09888df134bc0c51781595cf12817061a2eee", 0xed, 0x44, &(0x7f0000000140)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x3}, 0x8) 12:56:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1123.636462][T19225] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1123.652281][T19225] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1123.677803][T19250] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4800000000000000) [ 1123.710858][T19280] loop4: detected capacity change from 0 to 545 [ 1123.731511][T19280] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:56:13 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x200001dc) [ 1123.746558][T19255] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1123.756695][T19280] EXT4-fs (loop4): get root inode failed [ 1123.762304][T19255] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 [ 1123.780560][T19280] EXT4-fs (loop4): mount failed [ 1123.807372][T19287] loop5: detected capacity change from 0 to 545 [ 1123.835014][T19287] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000680)={'sit0\x00', &(0x7f0000000600)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @rand_addr=' \x01\x00'}}) 12:56:14 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'macsec0\x00', {0x2, 0x0, @multicast1}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0xa, 0x4e23, 0xdc27, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000100)="3ffd96518f3f8c0f0764a2ebcdaa3b7a20a2da045dd4e78e876fff7a0299d8f21c6fd8cfd4f9609fd76c6f2124f5f3fc3053a571d7dd50b8fab6802a8d840905efbb2215dfafa7b2d48e54ac6eefb31fe1207779244a5497c3fa78149f38be629957bfce42c8fab7595394c386", 0x6d}, {&(0x7f0000000200)="1e732a3502e21f6f52cd9c618aa2cd190d7bbfe36838619312fb305fbf9d17298fc423d4eafc18db48a8f9b3b4b703e085f60e4b1791f8ca0362534469fca93c0ef3337249ece38983e790239dced5dd786834dd650def1760ccb481ab2485c3346df69bd02bf43d3a661bc2d253228f981b46", 0x73}, {&(0x7f0000000280)="a1cfcc0cc27b260f89b37ad8c5225637d98b8ab2aa6a73496bcb0970716d3c56d82641e5f3ba424d6a14ca107a2c2335a75d29bc3d99c3b72e16114bf3cd9d494c40775f2d98ec90656f2945d1504ad5ef77533a8e0ae6d9958f2950a98dd3151462160dff8fe8eb9fb7e6ba4fcf826b86cecc9ca3c731e39c390abecb3dcdaa9a1465def87dfa0e227ba88abcad9869d114392e1d4b22f4e8a28c142e862c7d63e5542dc6f56a11b0a5806bdf217662662fc8f3ed6898ddeca53df7779499f203e5bc51fd9ca7de1b91a061cb83b558", 0xd0}, {&(0x7f0000000180)="8a2883af0f46", 0x6}, {&(0x7f0000000380)="8866a818be4245681100490f2976af3e4d377446b7dc3634eec20ad13cf81227350a8906ca8834de7c48fd75d2", 0x2d}], 0x5, &(0x7f0000000440)=[@rthdr={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x5, 0x0, [@remote, @mcast2, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x98}, 0x4000412) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 12:56:14 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f00000009c0)='./file0/file0/file0\x00', 0xa801, 0x190) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="181861716343be7bb10f360cbc19da706149385be84579a2206b9e11ff89c04d69021194b484cf4b26a3c11034e42dea5eb69f6a9facbfcc045ad882b7a38cbaf3db116d370640a9c5b144932723ef076bfa1b91e456ed295c0981b0f3cfbd312a9d6f7138f029a7ceb34c539f02f820b1663a54367ebbe074588515be46dcd981eb7367a0fe8284ea9e47907cabbbbccb080a67c5476996e5289e5fdb9a5cf8b02c28adfc8ca0d90fe5be6f75d25f96f2e27aaa27502b15bbece2b8f4986d8be133c7e37ea00fb8dd61a1d5f056de0522f2fbbd120ced46ebcc1e5968", 0xdd}, {&(0x7f0000000b80)="e0637aaf036b8cb7f7aa81cb8b0d67eced1d105607ef7fe43a9dbc968311b2756bacc63090dfe9cea604c71d2c", 0x2d, 0xfff}], 0x187df2a4a95ea7a3, &(0x7f0000000c00)={[{@utf8no}], [{@fowner_lt={'fowner<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ',\x00'}}]}) setresgid(r3, 0x0, 0x0) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x9, &(0x7f0000000700)=[{&(0x7f0000000140)="7fdbcaa00a9228adccda7a", 0xb}, {&(0x7f0000000180)="2cd234cd977bfd9499d4aab4792c6adcf2034d3a677ea40c344667e946803b2a4a2caa65317e82290403255238ba2bfcc5abbe1b43b7bb16", 0x38, 0x4}, {&(0x7f0000000300)="ee2c0d22370eda0bc5fe99be84e90b25633321994fd997d908c4e9e897083880ce5ab5f0355f40263ba7c327c6fb3fd786f6477e503d28f90667c2985dbc13aef6198342205ad6f2f128e203821c6daa37a45a5fbf0ef2bd62fa1035296eefc807d9dd23a1bf86e93350ea3fbde8dc23b91d59795ec8c4f78c54ed7220821f65d6ef77b288739d5d5d044d7666679d77bf2bd7016458b37c3f02c835a0bc321eaca88092cbefb7e45e8d76dc8cfec1fa9a7ea828114e4a1b95a944286650bb5c0a2d6e30a06c08d6", 0xc8, 0x6}, {&(0x7f00000001c0)="55f78a54ba77d2bba045a969c8e37b3aaa9ef047f669e5e4cd10aa561eb61e4ed59a4a7f8d793ccc", 0x28, 0x4}, {&(0x7f0000000400)="247162fba3f7db7300dba44912299de4828376ec0b3db85b5728cc4e966d43b0ede43c912e06473b94abe8e1d84369f89abafd401b4305f1f8a43d9a657c5bd707618fd052784298694f54c5845468cef98aa8e135eab475d09bb92982a1ff08bd4b0f665ca7422696013627d2936ccccd3a1c16ad26d02721cf7f425399674d59a5499462f9c382ad51bbd9bda94d1b3a3f9b02699ad85343d921aecebc1a3135fe21277599d72943ea423d493c39", 0xaf, 0x7fffffff}, {&(0x7f00000004c0)="3c0aa62b78d1e7302a5a686f5c8f692fd200a8534e000caa1201fbcff2afbfac363f999f0469719412395d3a37893f8c19ed5fecedc9fa441f32017c0c9e6185f1343e325a9c616e23873e93212c1187c5661357b355289f2fff3c03063620893fdb55fe3ea61a4e0cbbb04921d8d43458ecc2a0f84be7701acad73fdf696dc6dfa1e02f48c289ea33c40429eb8074847421a9", 0x93, 0xdd2}, {&(0x7f0000000580)="6ebcf9537fda2e5bfa684496e8b6b6046df98f81969a53e7068b0b2d217e3000ab81d9ff9fc51f106a9ca54c9b94d206e286114d5d76426a1a95a725e09b9113b336eb7cb4b97d721b6560c930591f4589f4ae45350103b251d988db6ca37c8735a8cae7a6e5537373ab283320709c503bd5687d705b906b36b9c353e378c2e8bb582e265e5496c66e832c0fe8f173", 0x8f, 0x4}, {&(0x7f0000000640)="e7156ad10e0cd165353b9ce2f20859f028228e852d63cbda810ed88e19694fc2b40fe69b2269bd05e7bb327b5ba25a0f577f19a5e3fb3a2caa34a6a2285ff70740b899", 0x43, 0x4}, {&(0x7f00000006c0)="98aa90", 0x3, 0xb7}], 0x1000405, &(0x7f00000008c0)={[{}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x37, 0x31, 0x6d, 0x25, 0x37]}}, {@size={'size', 0x3d, [0x36, 0x32, 0x6d, 0x35, 0x25, 0x35, 0x39, 0x34]}}, {@gid={'gid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80}}, {@euid_lt={'euid<', r4}}, {@subj_user={'subj_user', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r6}}]}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (async) close(r0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) open(&(0x7f00000009c0)='./file0/file0/file0\x00', 0xa801, 0x190) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000440)=0xc) (async) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xffffffffffffffe0, 0x2, &(0x7f0000000bc0)=[{&(0x7f0000000a80)="181861716343be7bb10f360cbc19da706149385be84579a2206b9e11ff89c04d69021194b484cf4b26a3c11034e42dea5eb69f6a9facbfcc045ad882b7a38cbaf3db116d370640a9c5b144932723ef076bfa1b91e456ed295c0981b0f3cfbd312a9d6f7138f029a7ceb34c539f02f820b1663a54367ebbe074588515be46dcd981eb7367a0fe8284ea9e47907cabbbbccb080a67c5476996e5289e5fdb9a5cf8b02c28adfc8ca0d90fe5be6f75d25f96f2e27aaa27502b15bbece2b8f4986d8be133c7e37ea00fb8dd61a1d5f056de0522f2fbbd120ced46ebcc1e5968", 0xdd}, {&(0x7f0000000b80)="e0637aaf036b8cb7f7aa81cb8b0d67eced1d105607ef7fe43a9dbc968311b2756bacc63090dfe9cea604c71d2c", 0x2d, 0xfff}], 0x187df2a4a95ea7a3, &(0x7f0000000c00)={[{@utf8no}], [{@fowner_lt={'fowner<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, ',\x00'}}]}) (async) setresgid(r3, 0x0, 0x0) (async) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) (async) setuid(r6) (async) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x9, &(0x7f0000000700)=[{&(0x7f0000000140)="7fdbcaa00a9228adccda7a", 0xb}, {&(0x7f0000000180)="2cd234cd977bfd9499d4aab4792c6adcf2034d3a677ea40c344667e946803b2a4a2caa65317e82290403255238ba2bfcc5abbe1b43b7bb16", 0x38, 0x4}, {&(0x7f0000000300)="ee2c0d22370eda0bc5fe99be84e90b25633321994fd997d908c4e9e897083880ce5ab5f0355f40263ba7c327c6fb3fd786f6477e503d28f90667c2985dbc13aef6198342205ad6f2f128e203821c6daa37a45a5fbf0ef2bd62fa1035296eefc807d9dd23a1bf86e93350ea3fbde8dc23b91d59795ec8c4f78c54ed7220821f65d6ef77b288739d5d5d044d7666679d77bf2bd7016458b37c3f02c835a0bc321eaca88092cbefb7e45e8d76dc8cfec1fa9a7ea828114e4a1b95a944286650bb5c0a2d6e30a06c08d6", 0xc8, 0x6}, {&(0x7f00000001c0)="55f78a54ba77d2bba045a969c8e37b3aaa9ef047f669e5e4cd10aa561eb61e4ed59a4a7f8d793ccc", 0x28, 0x4}, {&(0x7f0000000400)="247162fba3f7db7300dba44912299de4828376ec0b3db85b5728cc4e966d43b0ede43c912e06473b94abe8e1d84369f89abafd401b4305f1f8a43d9a657c5bd707618fd052784298694f54c5845468cef98aa8e135eab475d09bb92982a1ff08bd4b0f665ca7422696013627d2936ccccd3a1c16ad26d02721cf7f425399674d59a5499462f9c382ad51bbd9bda94d1b3a3f9b02699ad85343d921aecebc1a3135fe21277599d72943ea423d493c39", 0xaf, 0x7fffffff}, {&(0x7f00000004c0)="3c0aa62b78d1e7302a5a686f5c8f692fd200a8534e000caa1201fbcff2afbfac363f999f0469719412395d3a37893f8c19ed5fecedc9fa441f32017c0c9e6185f1343e325a9c616e23873e93212c1187c5661357b355289f2fff3c03063620893fdb55fe3ea61a4e0cbbb04921d8d43458ecc2a0f84be7701acad73fdf696dc6dfa1e02f48c289ea33c40429eb8074847421a9", 0x93, 0xdd2}, {&(0x7f0000000580)="6ebcf9537fda2e5bfa684496e8b6b6046df98f81969a53e7068b0b2d217e3000ab81d9ff9fc51f106a9ca54c9b94d206e286114d5d76426a1a95a725e09b9113b336eb7cb4b97d721b6560c930591f4589f4ae45350103b251d988db6ca37c8735a8cae7a6e5537373ab283320709c503bd5687d705b906b36b9c353e378c2e8bb582e265e5496c66e832c0fe8f173", 0x8f, 0x4}, {&(0x7f0000000640)="e7156ad10e0cd165353b9ce2f20859f028228e852d63cbda810ed88e19694fc2b40fe69b2269bd05e7bb327b5ba25a0f577f19a5e3fb3a2caa34a6a2285ff70740b899", 0x43, 0x4}, {&(0x7f00000006c0)="98aa90", 0x3, 0xb7}], 0x1000405, &(0x7f00000008c0)={[{}, {@nr_inodes={'nr_inodes', 0x3d, [0x25, 0x37, 0x31, 0x6d, 0x25, 0x37]}}, {@size={'size', 0x3d, [0x36, 0x32, 0x6d, 0x35, 0x25, 0x35, 0x39, 0x34]}}, {@gid={'gid', 0x3d, r3}}], [{@fsmagic={'fsmagic', 0x3d, 0x80}}, {@euid_lt={'euid<', r4}}, {@subj_user={'subj_user', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r6}}]}) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) 12:56:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:14 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) sendto$inet6(r0, &(0x7f0000000040)="9dca8b25238ee033b18751dccc30576e2ba63557d18fad804cd0bc12b24a0dfb542f00f25a9823a2c27c6c1173d39a0fcc30b4ba1385b2776de21aabb1d3cc8a5a2879dad73704395bb90fddc009e31730f2e1a231f948e7423166a15269c461615fe5fc846e5848016d3e60270ecbe31b098cef3497c2ceb5b855bc8b7ff76f1201505e39901983855b915b978101d9ffb7051ce081231d71f16bdb5124d2b30ddf95acf06d33c6d12dcd84e3ead339bcb106e98757224d7384e850100e0793f79721c2aa30abc89996a311da6eec44e739099b6103f5eaf233c09888df134bc0c51781595cf12817061a2eee", 0xed, 0x44, &(0x7f0000000140)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x3}, 0x8) 12:56:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4c00000000000000) 12:56:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x18, 0x0, &(0x7f0000000740)) [ 1124.771797][T19293] loop4: detected capacity change from 0 to 545 [ 1124.780507][T19298] loop2: detected capacity change from 0 to 545 [ 1124.780530][T19297] loop5: detected capacity change from 0 to 545 [ 1124.801913][T19297] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) 12:56:14 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x9) sendto$inet6(r0, &(0x7f0000000040)="9dca8b25238ee033b18751dccc30576e2ba63557d18fad804cd0bc12b24a0dfb542f00f25a9823a2c27c6c1173d39a0fcc30b4ba1385b2776de21aabb1d3cc8a5a2879dad73704395bb90fddc009e31730f2e1a231f948e7423166a15269c461615fe5fc846e5848016d3e60270ecbe31b098cef3497c2ceb5b855bc8b7ff76f1201505e39901983855b915b978101d9ffb7051ce081231d71f16bdb5124d2b30ddf95acf06d33c6d12dcd84e3ead339bcb106e98757224d7384e850100e0793f79721c2aa30abc89996a311da6eec44e739099b6103f5eaf233c09888df134bc0c51781595cf12817061a2eee", 0xed, 0x44, &(0x7f0000000140)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x3}, 0x8) socket$inet6(0xa, 0xa, 0x9) (async) sendto$inet6(r0, &(0x7f0000000040)="9dca8b25238ee033b18751dccc30576e2ba63557d18fad804cd0bc12b24a0dfb542f00f25a9823a2c27c6c1173d39a0fcc30b4ba1385b2776de21aabb1d3cc8a5a2879dad73704395bb90fddc009e31730f2e1a231f948e7423166a15269c461615fe5fc846e5848016d3e60270ecbe31b098cef3497c2ceb5b855bc8b7ff76f1201505e39901983855b915b978101d9ffb7051ce081231d71f16bdb5124d2b30ddf95acf06d33c6d12dcd84e3ead339bcb106e98757224d7384e850100e0793f79721c2aa30abc89996a311da6eec44e739099b6103f5eaf233c09888df134bc0c51781595cf12817061a2eee", 0xed, 0x44, &(0x7f0000000140)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}, 0x1c) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x3}, 0x8) (async) 12:56:14 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x10, 0x0, 0x0) [ 1124.811954][T19293] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1124.833207][T19293] EXT4-fs (loop4): get root inode failed [ 1124.838877][T19293] EXT4-fs (loop4): mount failed [ 1124.847594][T19298] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6800000000000000) 12:56:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1124.883696][T19298] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1124.899486][T19298] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 12:56:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x17}, 0x48) [ 1124.929319][T19317] loop5: detected capacity change from 0 to 545 [ 1124.940872][T19321] loop4: detected capacity change from 0 to 545 [ 1124.955072][T19321] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1124.978982][T19321] EXT4-fs (loop4): get root inode failed [ 1124.984737][T19321] EXT4-fs (loop4): mount failed [ 1124.991663][T19328] EXT4-fs warning (device loop2): ext4_dirblock_csum_verify:376: inode #2: comm syz-executor.2: No space for directory leaf checksum. Please run e2fsck -D. [ 1124.991869][T19317] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1125.007353][T19328] EXT4-fs error (device loop2): __ext4_find_entry:1625: inode #2: comm syz-executor.2: checksumming directory block 0 12:56:15 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'macsec0\x00', {0x2, 0x0, @multicast1}}) (async) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0xa, 0x4e23, 0xdc27, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000100)="3ffd96518f3f8c0f0764a2ebcdaa3b7a20a2da045dd4e78e876fff7a0299d8f21c6fd8cfd4f9609fd76c6f2124f5f3fc3053a571d7dd50b8fab6802a8d840905efbb2215dfafa7b2d48e54ac6eefb31fe1207779244a5497c3fa78149f38be629957bfce42c8fab7595394c386", 0x6d}, {&(0x7f0000000200)="1e732a3502e21f6f52cd9c618aa2cd190d7bbfe36838619312fb305fbf9d17298fc423d4eafc18db48a8f9b3b4b703e085f60e4b1791f8ca0362534469fca93c0ef3337249ece38983e790239dced5dd786834dd650def1760ccb481ab2485c3346df69bd02bf43d3a661bc2d253228f981b46", 0x73}, {&(0x7f0000000280)="a1cfcc0cc27b260f89b37ad8c5225637d98b8ab2aa6a73496bcb0970716d3c56d82641e5f3ba424d6a14ca107a2c2335a75d29bc3d99c3b72e16114bf3cd9d494c40775f2d98ec90656f2945d1504ad5ef77533a8e0ae6d9958f2950a98dd3151462160dff8fe8eb9fb7e6ba4fcf826b86cecc9ca3c731e39c390abecb3dcdaa9a1465def87dfa0e227ba88abcad9869d114392e1d4b22f4e8a28c142e862c7d63e5542dc6f56a11b0a5806bdf217662662fc8f3ed6898ddeca53df7779499f203e5bc51fd9ca7de1b91a061cb83b558", 0xd0}, {&(0x7f0000000180)="8a2883af0f46", 0x6}, {&(0x7f0000000380)="8866a818be4245681100490f2976af3e4d377446b7dc3634eec20ad13cf81227350a8906ca8834de7c48fd75d2", 0x2d}], 0x5, &(0x7f0000000440)=[@rthdr={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x5, 0x0, [@remote, @mcast2, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x98}, 0x4000412) (async) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 12:56:15 executing program 3: sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x153be8a28bd8f746) 12:56:15 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0xbff, 0x4, 0x40, 0x100, 0x7, 0x400000}) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x285, 0x4}}, './file0\x00'}) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x81, @remote, 0x1ff}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x6c00000000000000) 12:56:15 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) syz_open_dev$MSR(&(0x7f0000000340), 0x9, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000c80), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000001040), 0xffffffffffffffff) [ 1125.636093][T19356] loop5: detected capacity change from 0 to 545 [ 1125.636100][T19357] loop4: detected capacity change from 0 to 545 [ 1125.649010][T19358] loop2: detected capacity change from 0 to 545 [ 1125.661986][T19356] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:15 executing program 3: socketpair(0x1, 0x80002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 12:56:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7400000000000000) [ 1125.678460][T19357] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1125.694545][T19357] EXT4-fs (loop4): get root inode failed [ 1125.700245][T19357] EXT4-fs (loop4): mount failed [ 1125.718037][T19358] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:15 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 12:56:15 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x2002, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5452, &(0x7f0000000000)) [ 1125.757105][T19372] loop5: detected capacity change from 0 to 545 [ 1125.778317][T19374] loop4: detected capacity change from 0 to 545 [ 1125.785356][T19372] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1125.797577][ T24] audit: type=1400 audit(1646830575.289:524): avc: denied { write } for pid=19378 comm="syz-executor.3" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1125.831731][T19374] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1125.854304][T19374] EXT4-fs (loop4): get root inode failed [ 1125.859978][T19374] EXT4-fs (loop4): mount failed 12:56:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'macsec0\x00', {0x2, 0x0, @multicast1}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r1, &(0x7f0000000500)={&(0x7f00000000c0)={0xa, 0x4e23, 0xdc27, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000100)="3ffd96518f3f8c0f0764a2ebcdaa3b7a20a2da045dd4e78e876fff7a0299d8f21c6fd8cfd4f9609fd76c6f2124f5f3fc3053a571d7dd50b8fab6802a8d840905efbb2215dfafa7b2d48e54ac6eefb31fe1207779244a5497c3fa78149f38be629957bfce42c8fab7595394c386", 0x6d}, {&(0x7f0000000200)="1e732a3502e21f6f52cd9c618aa2cd190d7bbfe36838619312fb305fbf9d17298fc423d4eafc18db48a8f9b3b4b703e085f60e4b1791f8ca0362534469fca93c0ef3337249ece38983e790239dced5dd786834dd650def1760ccb481ab2485c3346df69bd02bf43d3a661bc2d253228f981b46", 0x73}, {&(0x7f0000000280)="a1cfcc0cc27b260f89b37ad8c5225637d98b8ab2aa6a73496bcb0970716d3c56d82641e5f3ba424d6a14ca107a2c2335a75d29bc3d99c3b72e16114bf3cd9d494c40775f2d98ec90656f2945d1504ad5ef77533a8e0ae6d9958f2950a98dd3151462160dff8fe8eb9fb7e6ba4fcf826b86cecc9ca3c731e39c390abecb3dcdaa9a1465def87dfa0e227ba88abcad9869d114392e1d4b22f4e8a28c142e862c7d63e5542dc6f56a11b0a5806bdf217662662fc8f3ed6898ddeca53df7779499f203e5bc51fd9ca7de1b91a061cb83b558", 0xd0}, {&(0x7f0000000180)="8a2883af0f46", 0x6}, {&(0x7f0000000380)="8866a818be4245681100490f2976af3e4d377446b7dc3634eec20ad13cf81227350a8906ca8834de7c48fd75d2", 0x2d}], 0x5, &(0x7f0000000440)=[@rthdr={{0x68, 0x29, 0x39, {0x0, 0xa, 0x1, 0x5, 0x0, [@remote, @mcast2, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x98}, 0x4000412) (async) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) 12:56:16 executing program 3: socket$inet(0x10, 0x3, 0x5) 12:56:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x7a00000000000000) 12:56:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0xbff, 0x4, 0x40, 0x100, 0x7, 0x400000}) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x285, 0x4}}, './file0\x00'}) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x81, @remote, 0x1ff}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x3, 0x6) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0xbff, 0x4, 0x40, 0x100, 0x7, 0x400000}) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x285, 0x4}}, './file0\x00'}) (async) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x81, @remote, 0x1ff}, 0x1c) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:56:16 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="97210e3e3052", @broadcast, @void, {@ipv4={0x4305, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local, @broadcast}}}}}, 0x0) [ 1126.510199][T19387] loop4: detected capacity change from 0 to 545 [ 1126.510312][T19388] loop2: detected capacity change from 0 to 545 [ 1126.525526][T19385] loop5: detected capacity change from 0 to 545 [ 1126.529401][T19387] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:56:16 executing program 3: syz_emit_ethernet(0x5d3, &(0x7f00000000c0)={@random="654ff8ee3df0", @remote, @val, {@ipv6}}, 0x0) 12:56:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x11, 0x4305, r2, 0x1, 0x0, 0x6, @local}, 0x14) 12:56:16 executing program 3: syz_emit_ethernet(0x7bf, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6068165f07892b00fe800000000000001b5408339e0000000000a9"], 0x0) 12:56:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) (async, rerun: 64) r2 = socket(0x25, 0x1, 0x0) (rerun: 64) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, 0xbff, 0x4, 0x40, 0x100, 0x7, 0x400000}) (async, rerun: 64) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x285, 0x4}}, './file0\x00'}) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e21, 0x81, @remote, 0x1ff}, 0x1c) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x8cffffff00000000) [ 1126.555605][T19385] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1126.569880][T19387] EXT4-fs (loop4): get root inode failed [ 1126.575620][T19387] EXT4-fs (loop4): mount failed [ 1126.580988][T19388] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1126.636057][T19425] loop5: detected capacity change from 0 to 545 [ 1126.644574][T19425] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:16 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment={0x33, 0x0, 0x6, 0x1, 0x0, 0xd, 0x64}, 0x8) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:16 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x5) 12:56:16 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x97ffffff00000000) 12:56:16 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, 0x0) [ 1127.399496][T19431] loop4: detected capacity change from 0 to 545 [ 1127.401351][T19429] loop2: detected capacity change from 0 to 545 [ 1127.406125][T19433] loop5: detected capacity change from 0 to 545 [ 1127.428390][T19429] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/6) 12:56:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000200)) 12:56:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200904, 0xd0) 12:56:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x9e05000000000000) 12:56:17 executing program 3: r0 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) r1 = syz_io_uring_setup(0x2de7, &(0x7f0000001600)={0x0, 0x0, 0x1}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000280)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r0, 0x0, &(0x7f0000000180)="cf", 0x1, 0x1d}, 0x0) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x0) [ 1127.441652][T19431] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1127.446440][T19433] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1127.473344][T19431] EXT4-fs (loop4): get root inode failed [ 1127.479003][T19431] EXT4-fs (loop4): mount failed [ 1127.519207][T19449] loop2: detected capacity change from 0 to 545 [ 1127.524336][T19452] loop5: detected capacity change from 0 to 545 [ 1127.538217][T19452] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1127.563913][T19449] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:17 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment={0x33, 0x0, 0x6, 0x1, 0x0, 0xd, 0x64}, 0x8) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) socket$inet6(0xa, 0x6, 0x0) (async) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment={0x33, 0x0, 0x6, 0x1, 0x0, 0xd, 0x64}, 0x8) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) 12:56:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:17 executing program 3: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) 12:56:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xc405000000000000) 12:56:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x200904, 0xd0) 12:56:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1128.271613][T19466] loop5: detected capacity change from 0 to 545 [ 1128.274227][T19468] loop2: detected capacity change from 0 to 545 [ 1128.279018][T19467] loop4: detected capacity change from 0 to 545 [ 1128.293354][T19468] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200904, 0xd0) 12:56:17 executing program 0: r0 = socket$inet(0x2, 0x4, 0x8) ftruncate(r0, 0x2) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380082, @rand_addr=' \x01\x00'}, 0x1c) 12:56:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1128.314497][T19466] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1128.329886][T19467] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1128.345372][T19467] EXT4-fs (loop4): get root inode failed [ 1128.351056][T19467] EXT4-fs (loop4): mount failed [ 1128.419333][T19494] loop2: detected capacity change from 0 to 545 [ 1128.437752][T19494] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. 12:56:18 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment={0x33, 0x0, 0x6, 0x1, 0x0, 0xd, 0x64}, 0x8) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) 12:56:18 executing program 0: r0 = socket$inet(0x2, 0x4, 0x8) ftruncate(r0, 0x2) (async) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380082, @rand_addr=' \x01\x00'}, 0x1c) 12:56:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf4ffffff00000000) 12:56:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000200), 0x5a163634d9aace29, &(0x7f0000000080)=ANY=[@ANYRES32=0x0]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) [ 1129.135221][T19501] loop5: detected capacity change from 0 to 545 [ 1129.141994][T19499] loop4: detected capacity change from 0 to 545 [ 1129.143143][T19505] loop2: detected capacity change from 0 to 264192 [ 1129.159423][T19499] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1129.176457][T19501] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:18 executing program 0: r0 = socket$inet(0x2, 0x4, 0x8) ftruncate(r0, 0x2) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380082, @rand_addr=' \x01\x00'}, 0x1c) socket$inet(0x2, 0x4, 0x8) (async) ftruncate(r0, 0x2) (async) socket$inet6(0xa, 0x3, 0x6) (async) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x380082, @rand_addr=' \x01\x00'}, 0x1c) (async) 12:56:18 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000200), 0x5a163634d9aace29, &(0x7f0000000080)=ANY=[@ANYRES32=0x0]) close(r0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) (rerun: 32) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 12:56:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1129.188351][T19499] EXT4-fs (loop4): get root inode failed [ 1129.194077][T19499] EXT4-fs (loop4): mount failed [ 1129.223901][T19521] loop2: detected capacity change from 0 to 264192 12:56:18 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xf6ffffff00000000) 12:56:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 1129.279728][T19535] loop5: detected capacity change from 0 to 545 [ 1129.296748][T19538] loop4: detected capacity change from 0 to 545 [ 1129.314831][T19535] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1129.323520][T19538] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1129.337015][T19538] EXT4-fs (loop4): get root inode failed [ 1129.342723][T19538] EXT4-fs (loop4): mount failed 12:56:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x380080, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 12:56:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000200), 0x5a163634d9aace29, &(0x7f0000000080)=ANY=[@ANYRES32=0x0]) close(r0) (async, rerun: 32) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) unlinkat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 12:56:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) socketpair(0x10, 0x800, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000000c0)="6b6c8f0d8ea6a8b4eaf59da9ab59b1661136238a87e6d27e7906cb1db03a620fa5aa8f40717dd377ced871d5c57b0368989185b3aa9b6a4c99fd61118ab0ad56580076945482694c17b7fe747ed3391026a73182059bebd42b493c9a2770033cd90b0934f5902df82c2496498035c917e09c106469c2c12837cf41983fe14f96b45b566bdd20fc83f03ad0e6d02b0ba63fc7b8946f6abeeda641faacb9461f133d8ffe323fd435ee96d5afa72808968ed5b5c264c6f634707954b6fe19b3177585389985bc", 0xc5, 0x4000000, &(0x7f0000000200)={0xa, 0x4e23, 0x8000, @private2, 0x800}, 0x1c) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000300)=0x28) r3 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)="9ff32f1a4ffc57fca69a9bb22fbfb6b2b58a5f7b9c70cbcd2f94462a607402a0fdb87cea1a4ee9801358011b472a9e0b9112f7275b9818f5a58f839643abd6493b2c6e169eed8f88c0e00af8a47b230a932f88e05a211760d241cf36b194fecc0e0af962", 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x0) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e22, 0x401, @private1, 0x5}, 0x1c) accept$inet6(r1, 0x0, &(0x7f0000000280)) 12:56:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfbffffff00000000) 12:56:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x12, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) socketpair(0x10, 0x800, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000000c0)="6b6c8f0d8ea6a8b4eaf59da9ab59b1661136238a87e6d27e7906cb1db03a620fa5aa8f40717dd377ced871d5c57b0368989185b3aa9b6a4c99fd61118ab0ad56580076945482694c17b7fe747ed3391026a73182059bebd42b493c9a2770033cd90b0934f5902df82c2496498035c917e09c106469c2c12837cf41983fe14f96b45b566bdd20fc83f03ad0e6d02b0ba63fc7b8946f6abeeda641faacb9461f133d8ffe323fd435ee96d5afa72808968ed5b5c264c6f634707954b6fe19b3177585389985bc", 0xc5, 0x4000000, &(0x7f0000000200)={0xa, 0x4e23, 0x8000, @private2, 0x800}, 0x1c) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000300)=0x28) (async) r3 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)="9ff32f1a4ffc57fca69a9bb22fbfb6b2b58a5f7b9c70cbcd2f94462a607402a0fdb87cea1a4ee9801358011b472a9e0b9112f7275b9818f5a58f839643abd6493b2c6e169eed8f88c0e00af8a47b230a932f88e05a211760d241cf36b194fecc0e0af962", 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x0) (async) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e22, 0x401, @private1, 0x5}, 0x1c) accept$inet6(r1, 0x0, &(0x7f0000000280)) 12:56:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x380080, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 1130.002725][T19542] loop2: detected capacity change from 0 to 264192 [ 1130.018800][T19547] loop4: detected capacity change from 0 to 545 [ 1130.026578][T19550] loop5: detected capacity change from 0 to 545 12:56:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) (async) socketpair(0x10, 0x800, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000000c0)="6b6c8f0d8ea6a8b4eaf59da9ab59b1661136238a87e6d27e7906cb1db03a620fa5aa8f40717dd377ced871d5c57b0368989185b3aa9b6a4c99fd61118ab0ad56580076945482694c17b7fe747ed3391026a73182059bebd42b493c9a2770033cd90b0934f5902df82c2496498035c917e09c106469c2c12837cf41983fe14f96b45b566bdd20fc83f03ad0e6d02b0ba63fc7b8946f6abeeda641faacb9461f133d8ffe323fd435ee96d5afa72808968ed5b5c264c6f634707954b6fe19b3177585389985bc", 0xc5, 0x4000000, &(0x7f0000000200)={0xa, 0x4e23, 0x8000, @private2, 0x800}, 0x1c) (async) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000300)=0x28) (async) r3 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)="9ff32f1a4ffc57fca69a9bb22fbfb6b2b58a5f7b9c70cbcd2f94462a607402a0fdb87cea1a4ee9801358011b472a9e0b9112f7275b9818f5a58f839643abd6493b2c6e169eed8f88c0e00af8a47b230a932f88e05a211760d241cf36b194fecc0e0af962", 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x0) (async) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e22, 0x401, @private1, 0x5}, 0x1c) (async) accept$inet6(r1, 0x0, &(0x7f0000000280)) 12:56:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x44e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x4}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4082, 0x19) close(r0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3211010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:19 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.055852][T19547] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid 12:56:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x380080, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 12:56:19 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.101983][T19550] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1130.114380][T19572] loop2: detected capacity change from 0 to 545 [ 1130.133369][T19547] EXT4-fs (loop4): get root inode failed [ 1130.139068][T19547] EXT4-fs (loop4): mount failed 12:56:19 executing program 3: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendto$inet6(r1, &(0x7f0000000040)="d084f40cd904ddb38e0246156b809df249c7dc7824b9eee9468a446ec9d19fbccd760e390cfec0577bfc1552b77b9e934e642bbf6dfcae", 0x37, 0x1001, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast2, 0x9}, 0x1c) 12:56:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfdffffff00000000) 12:56:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.156845][T19572] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 12:56:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x44e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x4}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4082, 0x19) (async) close(r0) (async) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3211010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.208417][T19587] loop5: detected capacity change from 0 to 545 [ 1130.222727][T19589] loop4: detected capacity change from 0 to 545 [ 1130.237566][T19591] loop2: detected capacity change from 0 to 545 12:56:19 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfeffffff00000000) [ 1130.249439][T19591] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1130.259126][T19587] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 1130.271964][T19589] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1130.286082][T19589] EXT4-fs (loop4): get root inode failed [ 1130.291843][T19589] EXT4-fs (loop4): mount failed 12:56:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x44e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x4}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4082, 0x19) close(r0) (async) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x3211010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:19 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.330804][T19603] loop5: detected capacity change from 0 to 545 [ 1130.351702][T19605] loop2: detected capacity change from 0 to 545 [ 1130.361294][T19610] loop4: detected capacity change from 0 to 545 [ 1130.372839][T19603] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. 12:56:19 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) [ 1130.383005][T19605] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1130.422179][T19610] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1130.463759][T19610] EXT4-fs (loop4): get root inode failed [ 1130.469428][T19610] EXT4-fs (loop4): mount failed 12:56:20 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendto$inet6(r1, &(0x7f0000000040)="d084f40cd904ddb38e0246156b809df249c7dc7824b9eee9468a446ec9d19fbccd760e390cfec0577bfc1552b77b9e934e642bbf6dfcae", 0x37, 0x1001, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast2, 0x9}, 0x1c) socket$inet6(0xa, 0x6, 0x0) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) sendto$inet6(r1, &(0x7f0000000040)="d084f40cd904ddb38e0246156b809df249c7dc7824b9eee9468a446ec9d19fbccd760e390cfec0577bfc1552b77b9e934e642bbf6dfcae", 0x37, 0x1001, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast2, 0x9}, 0x1c) (async) 12:56:20 executing program 3: syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffb577c00200000003000000002000000000000000200000000000000000", 0xffffffe5}], 0x2) 12:56:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xfeffffffffffffff) 12:56:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x90c8, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="7d8cd9cb7a872c22afc7ab692500afa7c5d527c2cb3f678198c348e2a801a511bcaace3d9b784bb90f3351c093d4b307568def4f258640f7550d8ab6dd56e455afa2dba77569f48af9b9f849fc104d7254acf3c6a931a20590e7d44e85664c446a5cbb7ee5c9009803f35d81feb7c3517b8b73880d98fe058792b17e4552868553b7b4695b9399921c0df081216ac4f41401a6d505aaf2a36fe865cdd00979f39bafb61af26a6b3efa59d6ee03fc5b30a0a34b66d7e632b8e35ee97e5f02e7fc5f3572852633e9357846f4b303ccdd5a14494d8708016fc9dd02668cb7a74ec4bac256e0d0422edd", 0xe8, 0x5}, {&(0x7f0000000140)="f353bd12674c06b55dc5857ceac8b20ddc7bbd9c8384cd3280df081ba8f8abc40837bba42fa6366832a26c1b902200aaab6089c8416f0c37656f983e06c60f29d10b6b6095e5412f366d9d942ae5c08a13696809bf5ec1f117791e383f787a80d12c82fd", 0x64, 0x7ff}, {&(0x7f0000000400)="a01dc163523a9fb142b763c54ff10aec554f917a67ed3b68c094726ea259ef4c0c67ae75a66eb8499ddc3f0f039d96f97edb92b48d9b972b7a6be12b3b39f345e2b1067c4f6c1ff64544585bd8afb5eeb7749ee5583b8f5d288eaf4b908e10a2e6371f7f9e07af0215aad482aaa34793d704f22401c6257967c1a475596e5af78a09c3cd", 0x84}, {&(0x7f00000004c0)="9b9828c1bd903e95374a44d5d77e6938bf9793ae7a76ae5d510d149a4112438992010e3bcbeb8077f58bd1d5323f3bfffe0836037305a14516cf6b28a7e43792b3d8cfe93c7937b4d65fbcd9764ff65e9d9a63d8638a5bbae526290a1dc88803780578181f60136ff0679b38b6ba0bcdce25ec120ac1ee63fd5d054d77389881724d630f24844fc5863979fd6bf0aa39fc8897d4b3edfa604e24352bd7e10c4e82a2f41a8220bf6f050395bedecfded4941d8e5374506231415769420d956ef5dae53383ef562f235a294233c828e74ae942ad", 0xd3, 0x277}], 0x20400, &(0x7f0000000640)={[], [{@uid_gt={'uid>', 0xee00}}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r2}}]}) close(r0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x105000, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x58, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000c040}, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) 12:56:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) [ 1131.050590][T19621] loop5: detected capacity change from 0 to 545 [ 1131.067124][T19623] loop2: detected capacity change from 0 to 545 [ 1131.077955][T19625] loop4: detected capacity change from 0 to 545 12:56:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) close(r0) umount2(&(0x7f00000002c0)='./file0\x00', 0xff0f000000000000) [ 1131.105537][T19625] EXT4-fs error (device loop4): __ext4_fill_super:5277: inode #2: comm syz-executor.4: iget: checksum invalid [ 1131.148380][ T24] audit: type=1400 audit(1646830580.639:525): avc: denied { write } for pid=1914 comm="kworker/1:4" path="socket:[189299]" dev="sockfs" ino=189299 scontext=system_u:system_r:kernel_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 12:56:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) (async) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x90c8, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000300)="7d8cd9cb7a872c22afc7ab692500afa7c5d527c2cb3f678198c348e2a801a511bcaace3d9b784bb90f3351c093d4b307568def4f258640f7550d8ab6dd56e455afa2dba77569f48af9b9f849fc104d7254acf3c6a931a20590e7d44e85664c446a5cbb7ee5c9009803f35d81feb7c3517b8b73880d98fe058792b17e4552868553b7b4695b9399921c0df081216ac4f41401a6d505aaf2a36fe865cdd00979f39bafb61af26a6b3efa59d6ee03fc5b30a0a34b66d7e632b8e35ee97e5f02e7fc5f3572852633e9357846f4b303ccdd5a14494d8708016fc9dd02668cb7a74ec4bac256e0d0422edd", 0xe8, 0x5}, {&(0x7f0000000140)="f353bd12674c06b55dc5857ceac8b20ddc7bbd9c8384cd3280df081ba8f8abc40837bba42fa6366832a26c1b902200aaab6089c8416f0c37656f983e06c60f29d10b6b6095e5412f366d9d942ae5c08a13696809bf5ec1f117791e383f787a80d12c82fd", 0x64, 0x7ff}, {&(0x7f0000000400)="a01dc163523a9fb142b763c54ff10aec554f917a67ed3b68c094726ea259ef4c0c67ae75a66eb8499ddc3f0f039d96f97edb92b48d9b972b7a6be12b3b39f345e2b1067c4f6c1ff64544585bd8afb5eeb7749ee5583b8f5d288eaf4b908e10a2e6371f7f9e07af0215aad482aaa34793d704f22401c6257967c1a475596e5af78a09c3cd", 0x84}, {&(0x7f00000004c0)="9b9828c1bd903e95374a44d5d77e6938bf9793ae7a76ae5d510d149a4112438992010e3bcbeb8077f58bd1d5323f3bfffe0836037305a14516cf6b28a7e43792b3d8cfe93c7937b4d65fbcd9764ff65e9d9a63d8638a5bbae526290a1dc88803780578181f60136ff0679b38b6ba0bcdce25ec120ac1ee63fd5d054d77389881724d630f24844fc5863979fd6bf0aa39fc8897d4b3edfa604e24352bd7e10c4e82a2f41a8220bf6f050395bedecfded4941d8e5374506231415769420d956ef5dae53383ef562f235a294233c828e74ae942ad", 0xd3, 0x277}], 0x20400, &(0x7f0000000640)={[], [{@uid_gt={'uid>', 0xee00}}, {@fsname={'fsname', 0x3d, 'ext4\x00'}}, {@euid_lt={'euid<', r2}}]}) (async) close(r0) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x105000, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x58, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x2000c040}, 0x0) (async) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 12:56:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) 12:56:20 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r1) r2 = socket(0x25, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) sendto$inet6(r1, &(0x7f0000000040)="d084f40cd904ddb38e0246156b809df249c7dc7824b9eee9468a446ec9d19fbccd760e390cfec0577bfc1552b77b9e934e642bbf6dfcae", 0x37, 0x1001, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast2, 0x9}, 0x1c) socket$inet6(0xa, 0x6, 0x0) (async) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) (async) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380080, @empty}, 0x1c) (async) creat(&(0x7f00000001c0)='./file0\x00', 0x0) (async) close(r1) (async) socket(0x25, 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000640), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) (async) sendto$inet6(r1, &(0x7f0000000040)="d084f40cd904ddb38e0246156b809df249c7dc7824b9eee9468a446ec9d19fbccd760e390cfec0577bfc1552b77b9e934e642bbf6dfcae", 0x37, 0x1001, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast2, 0x9}, 0x1c) (async) 12:56:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) [ 1131.196193][T19640] loop5: detected capacity change from 0 to 545 [ 1131.207258][T19625] EXT4-fs (loop4): get root inode failed [ 1131.212956][T19625] EXT4-fs (loop4): mount failed 12:56:20 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) 12:56:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020", 0x81, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 12:56:20 executi